Fraud Protection August 17, 2017 Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security 3 min read - To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
August 8, 2017 Speared! Malicious Emails Phish Up Russian Enterprise Backdoors 2 min read - A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
Identity & Access July 12, 2017 Outsider or Insider: Who Will Cause Today’s Data Breach? 2 min read - Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
April 20, 2017 Email Tracking Is More Than a Marketing Tool 2 min read - Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
Threat Intelligence April 10, 2017 Use Email to Manage Threat Intelligence Collections 2 min read - The IBM X-Force Exchange includes an email inbox feature that cuts down on information overload and enables analysts to easily share threat intelligence.
March 7, 2017 Silly Spammers: Email Scam Company Compromises Itself With Bad Data Backup 2 min read - A bad data backup configuration recently exposed email spammers, gives security professionals an inside look at spam operations.
February 22, 2017 New Google Phishing Report: The Lure of Corporate Inboxes 2 min read - A new phishing report from Google Research makes it clear: Corporate inboxes lure the largest number of phishing and malware attacks.
January 26, 2017 Sage Ransomware Levels Up < 1 min read - The latest version of Sage ransomware was recently observed, and it's asking victims to pay $2,000 as part of its new campaign.
Fraud Protection November 2, 2016 The Art and Science of How Spam Filters Work 4 min read - Few truly understand how spam filters work, but nearly every internet user benefits from the security they provide on a daily basis.
Advanced Threats August 24, 2016 Understanding the SPF and DKIM Spam Filtering Mechanisms 5 min read - Sender Policy Framework and DomainKeys Identified Mail are two techniques that can be used to limit the amount of spam in inboxes.