Blog Post2FWebinar Images (74)

What is a Cloud Access Security Broker (CASB)? | Infographic

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. What is a Cloud Access Securi...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the fut...

Read more

Blog Post2FWebinar Images (70)

Phishing Training for Employees: Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer r...

Read more

ZeroFont-Phishing-Manipulating-Font-Size-to-Get-Past-Office-365-Security-Featured

ZeroFont Phishing: Manipulating Font Size to Get Past Office 365 Security

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, whi...

Read more

definition-of-casb

What makes a good CASB (Cloud Access Security Broker)?

What is a CASB? I am attending the Gartner Security and Risk Management Conference this week, and both analysts and customers are seeing a change in the cloud securi...

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized By Hackers

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

baseStriker-Office-365-Security-Fails-To-Secure-100-Million-Email-Users-Featured

baseStriker: Office 365 Security Fails To Secure 100 Million Email Users

Update: Microsoft has repaired this vulnerability on 5/16/18, two weeks after we first reported it to them. We recently uncovered what may be the largest security fl...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Spoofpoint

Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both P...

Read more

8-considerations-featured

Office 365 Security: 8 Security Considerations When Moving to Office 365

So you’re considering a move to Office 365? Or, maybe you just moved? After you board up the server room and breathe a huge sigh of relief, it’s time to rethink what...

Read more

Reagan Attack Featured

The "Ronald Reagan" Attack Allows Hackers to Bypass Gmail's Anti-phishing Security

We started tracking a new method hackers use to bypass Gmail's SPF check for spear-phishing. The hackers send from an external server, the user receives the email fr...

Read more

Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

capital-caring-ft

Capital Caring: Avanan Cloud Security for Healthcare

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their fami...

Read more

LinKRewrites Featured-1

URL Defense Link Rewrites: The Good, The Bad, and The Over-Promised

URL Link Rewriting is a technique used by several email security companies to help in the fight against malicious links in emails. Proofpoint's Targeted Attack Prote...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

Avanan Anomaly Alerts during an Account Takeover

Account Takeover: A Critical Layer Of Your Email Security

Last week the National Law Review published a short news article about the massive data breach that happened through email at the Henry Ford Health System. What they...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gm...

Read more

Blog Post2FWebinar Images (42).png

WEBINAR: Future-Proofing Your Security for 2018

You can’t predict when, but we can show you how the next attack might happen. In this webinar we discuss the security trends of 2017 that predict the most likely thr...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial