In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...
In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...
Email is one of the most common vectors by which cybercriminals gain access to corporate networks and steal sensitive data. This makes email security a vital compone...
Phishing emails are one of the most common cyber threats that an organization may face. Phishing attacks can be used to accomplish a variety of goals for an attacker...
We're excited to release SmartPhish Analysis. In our email dashboard, you'll see a number of info panels that give insight into our AI's decision into marking an ema...
Slack Security Slack is an incredibly popular app. It became a lifeline for so many companies during remote work in 2020 and it will remain an essential part of work...
The State of Business Email Compromise Everyone is talking about Business Email Compromise (BEC) attacks. And with good reason.
What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
What is Phishing? The first mass email in 1978 was sent to just under 400 users. That seems quaint, now. It would be ten years before mass emailing turned into somet...
Hackers want your credentials. It’s why the Verizon DBIR found that the top threat varieties in breaches were phishing and the use of stolen creds. Phish users to ge...
Highlights Microsoft’s Office 365 ATP policies flag an unusually high percentage of legitimate emails as phishing detections Organizations that set their ATP policie...
Email is not secure by nature, because email was never meant to be secure. The way email is used today — and its security needs — differs greatly from what its inven...
What is BEC? There is ambiguity about what Business Email Compromise (BEC) means. Is it an email impersonating an executive for financial gain? Is it the same thing ...
Email is used by 3.8 billion people every day, and its popularity is only growing. Unfortunately, that makes it the favorite channel for opportunistic and targeted a...
A phishing scam is when a hacker pretends to be a trusted person in order to access a user’s account, trick them into giving up sensitive/personal information, or in...
See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...
Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...
Google's G Suite brings much-needed convenience and organization to the enterprise cloud. But, can a Google Drive account be hacked? Because of its popularity, it is...
Regardless of their age, role, or security competency, employees must follow basic practices to protect organization and its data. Training doesn’t have to come in t...
When 2-factor authentication (2FA) is combined with password managers like 1Password and LastPass, it can help people securely access their personal and work account...
See why phishing has became one of cyber security's most common threats, and what can be done about it. Lots of numbers, percentages, and costs are associated with p...