Human-Operated Ransomware

Ransomware has emerged as a dominant cyber threat and one of the most expensive types of cyberattacks that an organization can fall victim to. However, not all ranso...

Read more

The Millisecond Myth, Exposed

By now, the differences between Avanan and other API-based solutions are clear:

Read more

Abusing Microsoft Customer Voice to Send Phishing Links

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers. 

Read more

What is a Vishing Attack?

Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...

Read more

How Black Basta Ransomware Group Starts Their Attack

A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...

Read more

BEC on the Rise: How to Defend Against It

Arctic Wolf recently published a survey of attacks from the first half of 2022 and found that there was a significant uptick in Business Email Compromise attacks. 

Read more

DLP is an Essential Task of Email and Collaboration Security

Whenever a company holds data, there is a chance for a breach. And since companies continue to hold valuable data of all kinds, it is becoming more costly for a brea...

Read more

Sending Trojans via Scanners

Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.

Read more

Global Cyber Threats On the Rise

Global threats on are the rise. Check Point Research has noted a 28% increase in the third quarter of 2022, compared to the same period in 2021. 

Read more

DHL Takes the Brand Phishing Crown

In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.

Read more

Hijacking Student Accounts to Launch BEC-Style Attacks

Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...

Read more

Hackers Shifting Their Messages

A new study from KnowBe4 has quantified which phishing subject lines and links are the most likely to be clicked.

Read more

Incident Responders Have it Rough

A new survey by IBM confirms what many in the incident response field know all too well--it's an incredibly difficult job.

Read more

Video: The Google Translate Attack

Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...

Read more

Spoofing Google Translate to Steal Credentials

Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.

Read more

Link Re-Writing Inside Attachments

Scanning a link in the body of an email list an essential part of any security solution, though not everybody can do it. It's important because links that appear fin...

Read more

Ransomware Tops Companies' Concerns

A new report from SonicWall found that ransomware is the biggest concern of most customers. A whopping 91% said it was their biggest concern. Phishing (76%) and encr...

Read more

Secure Handling of Password-Protected Attachments

Password-protected attachments can be inspected, even if the email does not contain their passwords. Many phishing attacks include password-protected attachments as ...

Read more

URL Emulation Behind Links for Better Security

Avanan's Click-Time Protection emulates websites behind links, to detect elusive zero-day phishing websites.  

Read more

Evaluating Microsoft and Other Email Security Services

Microsoft is the most popular email service in the world. 

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial