cloud account takeover featured

White Paper: Cloud Account Takeover

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against...

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gm...

Read more

5 Phishing Attack Trends to Look out for in 2019

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we ...

Read more

Attack Report: Phishing Your HR Platform in the Cloud

Avanan’s security analysts recently tracked an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise...

Read more

Microsoft Advanced Threat Protection vs Avanan

Microsoft knows that Office 365's default security features are not enough to keep an organization protected, which is why they created Microsoft Advanced Threat Pro...

Read more

VerizonDataBreachInvestigationsReport.png

Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Earlier this month, Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from...

Read more

Was My Email Hacked? - When Phishing Succeeds

Before you continue reading, you should check to see if your email address is one of millions that has already been compromised: HaveIBeenPwned.com. An attacker coul...

Read more

Attack Report: Gmail Vulnerable to Nickname Impersonation Spearphishing

The Basics of the Nickname Email Spoof Attack We have trained our users to distrust a sender's nickname and validate an identity by looking at the original email add...

Read more

Blog Post2FWebinar Images (36).png

Avanan Partner Series: How Lastline Detects Malware

With each day bringing new and different threats, we are always seeking out the next-gen technology that can defend against these next generation attacks. This is th...

Read more

Blog Post2FWebinar Images (35).png

Can a CASB Protect you from Phishing or Ransomware?

"Is Avanan a CASB?"   After joining a recent CASB panel with the Cloud Security Alliance I found myself answering this question over and over again. The answer depen...

Read more

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breac...

Read more

Attack Report: Excel Phishing Attack that Bypasses Office 365

This targeted phishing attack against Office 365 Outlook customers impersonates Excel Online in an HTML attachment in order to trick users into entering their creden...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial