What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...
What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...
Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...
The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...
A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.
Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...
Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...
We are seeing a rise in the number of phishing attacks that bypass Office 365 due to the attackers’ use of obfuscation techniques on the credential harvesting websit...
Highlights Avanan is the pioneer in API-based email security, having substantially more deployments than all other API-based vendors combined. The critical architect...
A new attack method bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). At the time of writing, Microsoft 365 is still vulnerable and the...
Highlights: Broadcom’s purchase of Symantec will lead to cuts of $1 billion in spending on R&D and sales Their focus is now on the Global 2000 customer base whil...