A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz.
A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz.
A big winner over the pandemic has been the use of collaboration apps. That includes Microsoft Teams and Slack and Zoom, but there are countless apps across the web ...
Attackers have found a consistent way to bypass SEG filters and get to the inbox. We've written about it a lot lately, in large part because we continue to see tons ...
A common way for attackers to evade security solutions is to include URL redirects in the body of an email. For security solutions to effectively determine if the UR...
Avanan researchers have uncovered an attack that leverages the notification of closing documents to send a credential harvesting link.
We've been writing a lot lately about hackers are leveraging legitimate services as attack vectors. This trend is not going away, whether it's Google Docs, MailGun, ...
How many Amazon notifications do you get? (If you're like some, it's a lot.) That means it's a perfect opportunity for hackers to try and exploit it to get some info...
Avanan analysts have recently discovered an exploit vector in Google Docs that attackers are using to deliver malicious phishing websites to victims.
With the increased attention to email security in every organization, users are getting used to receiving documents sent to them over "secure" services. With sensiti...
Avanan researchers have discovered an attack that takes over the account of a trusted customer to send phishing emails.
Attackers are using automated methods to generate attack email addresses that end in the onmicrosoft.com domain to try and bypass any email filters that may have onm...
Returning to the office? Many workers around the country and the world are. Hackers are noticing.
On May 17th, Avanan researchers noticed a spike in phishing emails containing links to a particular subdomain of GameStop.com. GameStop is an American gaming company...
Over the last three days, we have seen over 800 phishing emails sent to 11 different clients that try and leverage language that is normally used by physical or onli...
SEGs that rely on allow or blocklists are playing an ever-increasing catchup game when it comes to catching phishing emails. This phishing campaign shows us the resu...
A .dat file is a generic file that is used in various applications. What's unique about them is that they can only be used by the application that created them. For ...
Because of the rise of invoice related phishing emails, many security vendors have resorted to treating emails with the word “invoice” in the subject/body/attachment...
Attackers are sharing files with suspicious names to users through Dropbox. Because Dropbox is a reputable service, most email security vendors will allow these file...
The software industry is built on subscriptions. You pay for a year, or more, and then when the time comes, you can choose to renew (or not).
Scammers continually utilize and spoof file-sharing services to launch attacks. We've seen this recently with the We Shouldn't Transfer Attack, the Flipping Out Atta...