Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The font manipu...
Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The font manipu...
Update: Microsoft has repaired this vulnerability on 5/16/18, two weeks after we first reported it to them. We recently uncovered what may be the largest security fl...
Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...
This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both P...
So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what...
We started tracking a new method hackers use to bypass Gmail's SPF check for spear-phishing. The hackers send from an external server, the user receives the email fr...
As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...
Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their fami...
“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”
Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...