Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
Owners of small and medium-sized businesses (SMBs) should follow these IT security best practices to protect their data and gain a competitive advantage.
A malware researcher uncovered a spamming operation that compromised more than 711 million email addresses, the largest known data breach of its kind.
A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.
A bad data backup configuration recently exposed email spammers, gives security professionals an inside look at spam operations.