Avanan Blog Blog (9)


New Teams Attack Delivers Instant Malware

A recently discovered vulnerability in Microsoft Teams has opened the door for non-employees to effortlessly send harmful files to employees without undergoing any s...

Read more

Phorm Phishing: Using Form Service APIs to Steal Credentials

In recent months, Check Point Research has observed a surge in phishing attacks that exploit reputable online form builder services like Formspark, Formspree, EmailJ...

Read more

The Unified Quarantine: Saving the SOC Team Time and Frustration

It is widely acknowledged in the market that organizations require an extra layer of email security to complement Microsoft's existing protection.

Read more

PDF-Based Attacks on the Rise: Here's How Deep Learning Can Prevent Them

In June, 43% of all malicious files were PDFs, indicating a significant rise in their use for malicious purposes.

Read more

Artificial Intelligence in Cybersecurity: How Check Point's ThreatCloud AI Works

Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...

Read more

URL-Based Phishing: The Fake Meta Mask Page

URL-based phishing tricks users into providing sensitive information to hackers through fake links that imitate legitimate ones. We've been looking at some examples ...

Read more

Simplicity, Reliability and Flexibility with Deployments

A majority of our customers--90%--use our patented inline mode for email security.

Read more

Classic Account Takeover via the Direct Deposit Change

One of the key capabilities of an email security solution is the ability to detect anomalies. When something happens that's out of the ordinary, it can be a sign tha...

Read more

URL-Based Phishing: The Fake Instagram

One of the biggest problems with online security is URL-based phishing. These attacks involve fake links that mimic legitimate ones, tricking users into entering sen...

Read more

Over Half of Malicious Files are HTML Attachments

Our research has revealed that credential harvesting remains the top attack vector, responsible for 59% of attacks. This malicious tactic also plays a significant ro...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial