Content disarm and reconstruction (CDR), also known as Threat Extraction, proactively protects against known and unknown threats contained in documents by removing e...
Content disarm and reconstruction (CDR), also known as Threat Extraction, proactively protects against known and unknown threats contained in documents by removing e...
Sandboxing is a cybersecurity practice where you run code, observe and analyze and code in a safe, isolated environment on a network that mimics end-user operating e...
In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.
A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.
Microsoft’s Office 365 is one of the most commonly used platforms of cloud-based applications. Globally, Office 365 is used by around 38% of companies, a number that...
Data loss prevention (DLP) solutions are essential to protect the sensitive information of an organization and its customers. DLP solutions are designed to monitor d...
Recently, Americans Airlines stated that the personal information of a “very small number” of employees and customers was affected by an unauthorized party’s comprom...
Every season, G2 comes out with badges for their Best Of Lists. And every season, we humbled and blown away by the amount of positive reviews and badges we receive. ...
Channel Futures published a list of the top 20 email security providers and Avanan is proud to be on the list.
A successful credential harvesting scam can have devastating consequences.
Many attacks detonate post-delivery, meaning they easily get by email scanners and are only dangerous after the user clicks on the link. URL rewriting, along with ti...
A few years back, we coined the term "Dumpster Diving."
Expert Insights announced their Fall 2022 Best Of Awards, and Avanan is featured prominently.
How many times a day do you check your email on your phone? For 85% of us, checking email on mobile is the default. It's simple and easy.
Cyber insurance premiums have risen exponentially.
Avanan created the API-based email security field in 2015.
Check Point Research has uncovered a two-year-long campaign that is still going and making waves. The campaign starts by using spear-phishing and then sends maliciou...
Eight million businesses advertise their products on Facebook.
Spoofing brands is a common form of phishing.
Everybody loves a giveaway.