Root-Domain-Hack-Impacts-70-of-Email-Gateway-Customers-Featured

Root Domain Hack Impacts 70% of Email Gateway Customers

Hackers are bypassing email security gateways and sending phishing emails directly to Google and Office 365 root domains. If you’re using a gateway, and your mail fl...

Read more

avanan-wins-awards-featured

Avanan Wins Anti-Phishing Award from Cyber Defense Magazine

New York, March 11, 2019 — At the RSA Conference on March 4th, Cyber Defense Magazine announced Avanan as a recipient of the 2019 Infosec Awards, which honors "bold,...

Read more

The-NoRelationship-Attack-Bypasses-Office-365-Email-Attachment-Security-Featured

The NoRelationship Attack Bypasses Office 365 Email Attachment Security

Avanan identified a new phishing attack that bypasses EOP (Exchange Online Protection) URL filters, which scan Office documents like Word (.docx), Excel (.xlsx), and...

Read more

Z-WASP-Vulnerability-Used-to-Phish-Office-365-and-ATP-Featured

Z-WASP Vulnerability Used to Phish Office 365 and ATP

Executive Summary: The name Z-WASP references the zero-width space (‌) that hackers added to the middle of a malicious URL within the RAW HTML of the email. Wi...

Read more

ATP-Anti-Phishing-Compared-to-Avanan-Featured

ATP Anti-Phishing Compared to Avanan

Microsoft Advanced Threat Protection (ATP) serves a real need when it comes to fortifying the basic anti-phishing, anti-virus, and anti-malware that make up EOP, whi...

Read more

How-to-Stop-Reply-All-Email-Storms-Featured

How to Stop Reply-All Email Storms

Last week, Maria Peterson, a government employee in Utah, sent what she thought was an email inviting her colleagues to the annual holiday potluck. Instead, she acci...

Read more

Proofpoint-and-Mimecasts-Insider-Threat-Problem-Featured

Proofpoint and Mimecast's Insider Threat Problem

Proofpoint and Mimecast are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email server. This works well...

Read more

5-Signs-of-a-Compromised-Account-Featured

5 Signs of a Compromised Account

As an administrator, how can you standardize healthy account management at your organization and reduce the risk of account compromise? What configurations and setti...

Read more

Use Case Video Title Cards (1)

How to Find and Quarantine Emails from Compromised Accounts in Office 365

When you first deploy Avanan, you can conveniently identify and quarantine malicious content that was lurking in any mailbox at your organization. When an Office 365...

Read more

slack-secure-featured

Is Slack Secure? Slack Security Explained

Slack is now the most popular and fastest growing instant messaging system for business, with 100% ARR growth and more than 70% market share. For many organizations,...

Read more

Intro Card 2

How to Create a Policy to Quarantine Phishing and Malware Emails in Office 365

Learn how to create a policy that quarantines phishing and malware emails before they hit your users' Office 365 inboxes. This goes beyond just the emails that Micro...

Read more

link-featured-img

Why Does Link Scanning Miss so Many Phishing Attacks?

Link scanning is a security feature that identifies the safety of a link attached in an email. This protects users in the event that hackers would install malware or...

Read more

final intro card

How to Monitor Successful Logins to Office 365 Coming from Outside the US

In this short video, we show you how to easily monitor successful logins to Office 365 from outside the United States. Although employee logins from outside the US a...

Read more

proxy-featured

Why Proxies Cause Security Vulnerabilities

Proxies have garnered reputation as security products that ultimately undermine security. Designed to inspect network traffic for security purposes, proxies have bec...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

Blog Post2FWebinar Images

GDPR US Equivalent: Is the US Version of GDPR on the Horizon?

It is starting to look like the US, following in the footsteps of the EU, may crack down on how tech companies collect personal data. The National Telecommunications...

Read more

SINET-featured

SINET Names Avanan a Top 16 Cybersecurity Innovator

New York, September 26, 2018—SINET announced the recipients of the 2018 SINET 16 Innovator Award, which recognizes sixteen early stage and emerging technology compan...

Read more

Blog Post2FWebinar Images (100)

What Are Botnets and How to Defend Against Them

In 2016, the infamous Mirai botnet briefly derailed the internet, shutting down Dyn servers responsible for internet traffic and much of the internet’s infrastructur...

Read more

Prevent Phishing

Stop Phishing with Avanan's Anti-Phishing Software

In March of 2018, an employee at The Financial Services Information Sharing and Analysis center (FS-ISAC) clicked on a malicious link. From there, the phished email ...

Read more

Blog Post2FWebinar Images (91)

PhishPoint: New SharePoint Phishing Scam Affects an Estimated 10% of Office 365 Users

  Over the past two weeks, we detected (and blocked) a new SharePoint scam phishing attack that affected about 10% of Avanan's Office 365 customers. We estimate this...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial