Avanan Blog Blog (2)


The Piano Giveaway Scam

Everybody loves a giveaway.

Read more

Why You Need DMARC and DKIM...And Much More Besides

DMARC (Domain-based Message Authentication Reporting and Conformance) lets organizations know that the sender has permission to send from an email server.

Read more

Here's the Truth About How We Actually Operate

There are dozens of API-based email security vendors on the market. It’s a competitive market, and we’re always confident that our solution will win out. We know for...

Read more

Cyber Hygiene is Generally Poor, Cyber Attacks Generally Common

Just 3% of global security leaders rate their cyber hygiene as "Excellent," according to a new report. It's no surprise, then, that 75% of those surveyed in the same...

Read more

The Risk of Human Error

At The Channel Company’s XChange 2022 event recently, one of the speakers made a bold claim: "It's the person pressing the button. It's always a human making a mista...

Read more

10,000 Accounts Compromised in Large Scale Campaign Hitting Major Organizations

A fairly basic attack has stolen thousands of accounts across major organizations.

Read more

MFA, Man in the Middle and You

Microsoft has reported on a new man-in-the-middle phishing campaign, which targeted over 10,000 organizations in the last year. 

Read more

CFO Spoofed in Convincing Business Email Compromise Scam

If you get an email from your CFO requesting urgent action, what do you do?

Read more

The Static Expressway Hits Healthcare

We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...

Read more

Hackers Build Phishing Pages Using AWS Apps

Amazon Web Services (AWS) is one of the most popular cloud storage and hosting solutions. From major companies hosting their work on the service, to individuals usin...

Read more

Threat Intel is Now a Key Requirement of Businesses

A new survey found that threat intelligence is a critical part of an organization's cybersecurity strategy.

Read more

Best Buy Spoof Uses Google Storage to Launch Phishing Attack

Hackers spoof brands all the time. They are usually popular brands, such as Microsoft or Apple.

Read more

Ransomware Attacks Continue Their Upward Climb

A new report uncovers a whopper of a statistic. According to a report by Menlo Security, a third of all organizations experience a ransomware attack once a week. Fur...

Read more

Cyber Insurance Premiums on Track to Increase Even More

Panaseer released a cyber insurance trends report, with key insights into the market and into the process and challenges of obtaining cyber insurance. 

Read more

Mid Year Cyber Trends Show Continued Relentless Pace of Attacks

Check Point Research has released its mid-year cyber attack trends report, and the results are grim. 

Read more

Hackers Host Phishing Pages on Lucidchart

Lucidchart is a popular site used to collaborate on drawings, charts, diagrams and more.

Read more

The 5 Truths About Email Security

Email security is a fast-moving market. Threats are always adapting and evolving; there are new entrants in the market trying to secure it. Despite that, there are f...

Read more

Data Breaches Continue To Get More Expensive

Data breaches have hit an all-time high. The cost of a breach, according to IBM, is now a whopping $4.35 million this year. When phishing is the initial attack vecto...

Read more

Everyone Uses AI. Only Avanan Can Do This

Every email security vendor uses artificial intelligence. You'll see it marketed in big, bold letters on every vendor--including ours!--website.

Read more

Mirroring Actual Landing Pages for Convincing Credential Harvesting

The hacker has two tasks: Get into the inbox. And get the user to hand over the desired information. Hackers spend tons of time thinking of creative ways to do both....

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial