What is Email Spoofing and How Does it Work?

Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...

Read more

The Twitter attack reminds us the perils of internal threats

Twitter Hack: Attackers Gained Access Via Stolen Credentials

The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...

Read more

Microsoft 365 is Officially the Most Targeted Platform for Hackers

A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.

Read more

Companies Are Ditching Secure Email Gateways. This is Why.

Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...

Read more

SiteCloak Phishing: Office 365's Safe Links is Under Attack

Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...

Read more

No Longer Frustrated: The Long Overdue Change from Mimecast to Avanan

Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...

Read more

Calming the Seas: How a Biotech Research Firm Took Back Control With Avanan

Highlights: After being whalephished and inundated with attacks while using Proofpoint, this biotech firm switched to Avanan, and the attacks stopped Avanan gave a n...

Read more

SiteCloak Link Attack: Email URL Obfuscation Techniques

We are seeing a rise in the number of phishing attacks that bypass Office 365 due to the attackers’ use of obfuscation techniques on the credential harvesting websit...

Read more

API-Based Security: We Prevent. They Respond.

Highlights Avanan is the pioneer in API-based email security, having substantially more deployments than all other API-based vendors combined. The critical architect...

Read more

SYLKin Attack: New Malicious .slk files are bypassing Microsoft 365 Security, Risking 200M+ Users

A new attack method bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). At the time of writing, Microsoft 365 is still vulnerable and the...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial