Have You Seen These Phishing Attacks? If So, Beware

We see phishing campaigns all the time--dedicated, long-standing attempts to hit end-users.

Read more

The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How is Your SOC Handling Phishing?

Do you have a handle on how your SOC is handling phishing? More specifically, do you know how they are responding to end-user requests to restore messages and report...

Read more

How Does Ransomware Spread?

Ransomware. The word is enough to send shivers down any IT professional's spine.

Read more

CISOs Grow Increasingly Concerned About Email Security

The state of email security is a growing concern among IT and security decision-makers.

Read more

Why Do Governments Get Hacked So Often?

Governments are among the most attacked industries in the world. Why?  Because they hold incredible amounts of data. That data is gold for hackers. 

Read more

URL-Based Phishing On the Rise

Traditional phishing emails have followed the same set-up for decades – a malicious attachment or URL embedded in the email.

Read more

BEC 3.0 - Legitimate Sites for Illegitimate Purposes 

Security services have a problem and it’s called BEC 3.0.

Read more

Beware of the Microsoft Voice Scam

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers. 

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial