CFO Spoofed in Convincing Business Email Compromise Scam

If you get an email from your CFO requesting urgent action, what do you do?

Read more

The Static Expressway Hits Healthcare

We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...

Read more

Hackers Build Phishing Pages Using AWS Apps

Amazon Web Services (AWS) is one of the most popular cloud storage and hosting solutions. From major companies hosting their work on the service, to individuals usin...

Read more

Threat Intel is Now a Key Requirement of Businesses

A new survey found that threat intelligence is a critical part of an organization's cybersecurity strategy.

Read more

Best Buy Spoof Uses Google Storage to Launch Phishing Attack

Hackers spoof brands all the time. They are usually popular brands, such as Microsoft or Apple.

Read more

Ransomware Attacks Continue Their Upward Climb

A new report uncovers a whopper of a statistic. According to a report by Menlo Security, a third of all organizations experience a ransomware attack once a week. Fur...

Read more

Cyber Insurance Premiums on Track to Increase Even More

Panaseer released a cyber insurance trends report, with key insights into the market and into the process and challenges of obtaining cyber insurance. 

Read more

Mid Year Cyber Trends Show Continued Relentless Pace of Attacks

Check Point Research has released its mid-year cyber attack trends report, and the results are grim. 

Read more

Hackers Host Phishing Pages on Lucidchart

Lucidchart is a popular site used to collaborate on drawings, charts, diagrams and more.

Read more

The 5 Truths About Email Security

Email security is a fast-moving market. Threats are always adapting and evolving; there are new entrants in the market trying to secure it. Despite that, there are f...

Read more

Data Breaches Continue To Get More Expensive

Data breaches have hit an all-time high. The cost of a breach, according to IBM, is now a whopping $4.35 million this year. When phishing is the initial attack vecto...

Read more

Everyone Uses AI. Only Avanan Can Do This

Every email security vendor uses artificial intelligence. You'll see it marketed in big, bold letters on every vendor--including ours!--website.

Read more

Mirroring Actual Landing Pages for Convincing Credential Harvesting

The hacker has two tasks: Get into the inbox. And get the user to hand over the desired information. Hackers spend tons of time thinking of creative ways to do both....

Read more

New Survey Finds 71% of SOC is Burnt Out

A new survey has quantified the impact of the cybersecurity crisis on the SOC.

Read more

Education is the Most Attacked Sector

Check Point Research has found that education is the most attacked sector in the world.

Read more

Cyber Insurance Requirements Becoming More Stringent

Cyber insurance is getting increasingly hard to get.

Read more

LinkedIn is the Most Imitated Brand in Phishing

For the second quarter in a row, LinkedIn is the most imitated brand in phishing attacks, according to Check Point.

Read more

Sending Phishing Emails From PayPal

In June, we wrote about how hackers were sending phishing emails directly from QuickBooks.

Read more

Healthcare Ransomware Attacks on the Rise

A new report found that ransomware attacks on healthcare organizations increased 94% from 2021 to 2022.

Read more

How Small Businesses Can Have Enterprise-Grade Security Without an Enterprise Budget

60% of SMBs will go out of business after being hacked. But setting up a top-quality cybersecurity strategy that protects the entire business can be daunting--and ex...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial