<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">

Avanan Blog

Blog Post2FWebinar Images (52)

34 Cloud Security Terms You Should Know

Dylan Press | March 15, 2018 | Filed Under: Blog | Read More »

We hope you use this as a reference not only for yourself but for your team and in training your organization. Print this out and pin it outside your cubicle.


Capital Caring: Avanan Cloud Security for Healthcare

Michael Landewe | March 6, 2018 | Filed Under: Blog, Case Studies | Read More »

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy and direct support of patients and their families. Over 650 e...

LinKRewrites Featured-1

Link Rewrites: The Good, The Bad and The Over-Promised 

Gil Friedrich | March 2, 2018 | Filed Under: Blog | Read More »

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in email. Proofpoint's Targeted Attack Protection (TAP), Mim...

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

Michael Landewe | February 21, 2018 | Filed Under: Blog | Read More »

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”


9 Myths of Account Takeover

Dylan Press | January 17, 2018 | Filed Under: Blog | Read More »

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that thi...

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

Dylan Press | January 10, 2018 | Filed Under: Blog, phishing | Read More »

When people think of phishing attacks, often what comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite low. Maybe you...


Account Takeover: A Critical Layer Of Your Email Security

Gil Friedrich | December 19, 2017 | Filed Under: Blog | Read More »

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they didn't publish...


Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Dylan Press | December 14, 2017 | Filed Under: Blog, phishing, Attack Report | Read More »

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have seen this against both Office 365 and Gmail customers. What m...

Blog Post2FWebinar Images (42).png

[Webinar] Future-Proofing Your Security for 2018

Michael Landewe | December 7, 2017 | Filed Under: Webinars, Blog, Videos | Read More »

You can’t predict when, but we can show you how the next attack might happen. In this webinar we discuss the security trends of 2017 that predict the most likely threats of 2018. W...

5 Phishing Attack Trends to Look out for in 2018

Michael Landewe | December 1, 2017 | Filed Under: Blog, phishing | Read More »

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we can expect in 2...

Attack Report: Phishing Your HR Platform in the Cloud

Dylan Press | November 10, 2017 | Filed Under: Blog, phishing, Attack Report | Read More »

Avanan’s Security Analysts recently started tracking an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise HR ac...

Microsoft Advanced Threat Protection vs Avanan

Michael Landewe | November 3, 2017 | Filed Under: Blog | Read More »

Microsoft knows that Office 365's default security features are not enough to keep an organization protected, which is why they created Microsoft Advanced Threat Protection as an a...


Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Dylan Press | October 26, 2017 | Filed Under: Blog | Read More »

Earlier this month Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from Finance and Hea...


4 Reasons Microsoft "Safe Links" Make Office 365 Less Safe

Dylan Press | October 19, 2017 | Filed Under: Blog | Read More »

Since the first successful phishing attack, we have trained our email users to be suspicious of every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) includes a f...

When Phishing Succeeds: The Alternate Inbox Method

Michael Landewe | October 16, 2017 | Filed Under: Blog | Read More »

Before you continue reading, you should check to see if your email address is one of millions that has already been compromised: HaveIBeenPwned.com. An attacker could have your acc...

Attack Report: Gmail Vulnerable to Nickname Impersonation Spearphishing

Michael Landewe | October 11, 2017 | Filed Under: Blog, phishing, Attack Report | Read More »

The Basics of the Nickname Email Spoof Attack We have trained our users to distrust a sender's nickname and validate an identity by looking at the original email address. Most emai...

Blog Post2FWebinar Images (36).png

Avanan Partner Series: How Lastline Detects Malware

Michael Landewe | October 11, 2017 | Filed Under: Blog | Read More »

With each day bringing new and different threats, we are always seeking out the next-gen technology that can defend against these next generation attacks. This is the first in our ...

Blog Post2FWebinar Images (35).png

Can a CASB Protect you from Phishing or Ransomware?

Michael Landewe | October 6, 2017 | Filed Under: Blog | Read More »

"Is Avanan a CASB?"   After joining a recent CASB panel with the Cloud Security Alliance I found myself answering this question over and over again. The answer depends upon whether...

Blog Post2FWebinar Images (34).png

What to Do After You Have Fallen Victim to a Phishing Attack

Yoav Nathaniel | September 28, 2017 | Filed Under: Blog, phishing | Read More »

Even if you could block 100% of malware and phishing, it is still possible to have a compromised account: a lost post-it note, a massive Linkedin-type password breach, a re-used pa...

Attack Report: Excel Phishing Attack that Bypasses Office 365

Yoav Nathaniel | September 19, 2017 | Filed Under: Blog, Attack Report | Read More »

This targeted phishing attack against Office 365 Outlook customers impersonates Excel Online in an HTML attachment in order to trick users into entering their credentials. Avanan s...