By Eyal Benishti
on December 07, 2021
I am excited to announce our Series C investment of $64M, led by PSG, a leading growth equity firm partnering with software and technology-enabled service companies, with participation from existing ...
By IRONSCALES
on December 06, 2021
With the v42.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features: 
By Ian Thomas
on December 03, 2021
Babuk is a new ransomware gang that emerged in early 2021. The gang’s initial mission statement referenced a non-malicious intent to conduct ransomware attacks as an apparent audit of the security of ...
By Ian Thomas
on November 17, 2021
DoppelPaymer is a ransomware gang that extracts data from victims’ systems and then encrypts those same systems. Named after the strain of ransomware that the gang deploys, DoppelPaymer has ...
By Or Malzman
on November 14, 2021
Hackers can use their abilities to do good, to do bad and sometimes just to show what they can do. The last option was the case for this scenario. 
By Ian Thomas
on November 09, 2021
Egregor is a ransomware-as-a-service gang that has so far managed to claim at least 70 victims and extort tens of millions of dollars during a prolific yet short spell of operations. The Egregor ...
By IRONSCALES
on November 08, 2021
With the v41.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features: 
By Ian Thomas
on November 02, 2021
Clop is a ransomware gang that first appeared in February 2019 when security researchers found new ransomware strains with the .Cl0p extension. A spate of prolific and high-profile attacks within a ...
By Ian Thomas
on October 27, 2021
DarkSide is a ransomware gang that quickly made waves in the cybersecurity world with a range of high-profile attacks. After first notifying the world of their operations in an August 2020 dark web ...
By Ian Thomas
on October 20, 2021
With the v39.00.01 release of IRONSCALES, we are pleased to announce product improvements and new features.
By Ian Thomas
on October 20, 2021
Secure Email Gateways (SEGs) have been around for two decades. They were built to provide security for on-premises email deployments and were placed at the perimeter of a company’s security ...
By Ian Thomas
on October 19, 2021
Conti is a ransomware gang that has managed to wreak havoc on many organizations within just a short time. After first appearing in media headlines as recently as 2019, Conti has been behind several ...
By Ian Thomas
on October 15, 2021
Email Phishing is Biggest Security Threat To Businesses, According to IT Professionals
By Tristan Bishop
on October 14, 2021
Fostering channel partnerships with reputable value-added resellers (VARs) has become an important component of most cybersecurity companies go-to-market strategies. Challenged by what seems like ...
By Noah Gordon
on October 14, 2021
Background The IRONSCALES research team has recently identified a social engineering phishing scam that leverages confusion and disinformation about people and corporate COVID vaccine requirements to ...
By Eyal Benishti
on October 13, 2021
Google’s Gmail for Business has had an overhaul and now claims to offer AI-powered security features. According to its marketing materials, it will now offer advanced protection against phishing and ...
By Ian Thomas
on October 13, 2021
REvil is a notorious ransomware gang responsible for multiple high-profile cyber attacks targeting companies of all sizes. This article explores REvil’s origins, the types of malware payloads used by ...
By Ian Thomas
on October 12, 2021
“Rollin' in my 5.0. With my rag-top down so my hair can blow.”
By IRONSCALES
on October 11, 2021
With the v40.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features: 
By Ian Thomas
on October 05, 2021
Ransomware in Pharmaceutical Overview The pharmaceutical industry is comprised of public and private organizations focused on the research, development and manufacturing of drugs and medication. The ...
By J Stephen Kowski
on September 23, 2021
“I know I hear you talk about this all the time, but what is ransomware exactly?” my wife asked as we watched the evening news. Apart from being a great question, it’s one that a lot of folks have ...
By Ian Thomas
on September 22, 2021
Meeting the demands of modern digital-oriented customers has resulted in widespread digital transformation initiatives in the financial services industry. The new digital ecosystem harnesses ...
By Ian Thomas
on September 21, 2021
The mining industry encompasses organizations focused on the exploration for and extraction of valuable minerals and other elements from the Earth. Given the critical need to provide these minerals ...
By Ian Thomas
on September 21, 2021
From cloud backup to consulting to managed detection and response, businesses of all sizes leverage a number of IT services. These services add value to organizations through cost-effective ...
By Ian Thomas
on September 20, 2021
The agriculture industry spans a diverse range of businesses from growing crops, raising animals and harvesting fish and other animals from a farm, ranch or their natural habitats. Given the critical ...
By Ian Thomas
on September 17, 2021
Phishing remains the leading cause of ransomware attacks and shows no signs of slowing down. Leading MSPs around the globe recognize this issue and are constantly on the lookout for email security ...
By Ian Thomas
on September 14, 2021
The media and entertainment industry spans a diverse range of businesses from newspaper publishers to television broadcasters. Common to most business models within media and entertainment is a high ...
By Ian Thomas
on September 03, 2021
Telecommunications providers keep the world connected through phone calls, emails, the Internet, and television. It’s easy to take telecommunications services for granted until they suffer ...
By Ian Thomas
on September 02, 2021
Ransomware attacks pose serious cybersecurity risks for companies in the hospitality industry, which is a broad sector that includes hotels, tourism agencies, restaurants, and bars. Common to these ...
By IRONSCALES
on September 01, 2021
With the v38.00 release of IRONSCALES, we are pleased to announce product improvements and new features. Some of the release highlights include improved visibility to the recipients of a phishing ...
By Ian Thomas
on August 20, 2021
Ransomware attacks pose serious cybersecurity risks for retailers. If an attack manages to disrupt customer-facing operations during peak business periods, it could have a disastrous effect on a ...
By Ian Thomas
on August 12, 2021
Businesses in the energy sector produce, extract, sell, and supply various sources of energy. These energy sources include oil and gas reserves, nuclear energy, and renewable energy for fuel and to ...
By Noah Gordon
on August 11, 2021
Attack Summary Attack Description: FileShare Platform Credential Theft Impacted Mailboxes: 210 Number of Impacted Customers: 42 Security Bypass: SPF, DMARC, Third-Party Visual Scanners Payload: ...
By Or Malzman
on August 05, 2021
Background The IRONSCALES research team has recently noticed an alarming increase in the exploitation of legitimate file sharing services to deliver phishing attacks. Specifically, we are seeing ...
By Ian Thomas
on August 04, 2021
Higher education institutions are prime targets for ransomware attacks. Universities and colleges handle large amounts of sensitive personal data, facilitate a campus-wide intranet, and manage ...
By IRONSCALES
on August 03, 2021
Office 365 Mailbox Sync Enhancement The IRONSCALES automatic mailbox sync for Microsoft Office 365 was recently enhanced. Unlicensed Office365 mailboxes that cannot be protected will not sync to ...
By Ian Thomas
on July 29, 2021
Transportation companies provide critical functions in shipping products and carrying people to their destinations. Encompassing both transport and logistics companies, the transportation sector is ...
By IRONSCALES
on July 29, 2021
Enhanced Account Takeover (ATO) Protection (for O365 users only) ATO is a type of identity theft in which a cyber-criminal gains unauthorized access to a legitimate user’s online account. Once the ...
By Ian Thomas
on July 22, 2021
Organizations in the Legal industry, such as law firms, rely on IT for many of their critical operations. The very nature of this industry makes them prime candidates for ransomware attacks. Law ...
By Or Malzman
on July 21, 2021
Background CLOP is a notorious high-profile ransomware group that has compromised industries globally. Like other ransomware groups, CLOP hosts a leak site to pressure their victims into paying the ...
By Ian Thomas
on July 19, 2021
Disrupting operations at manufacturing plants is a potentially lucrative path for threat actors specializing in ransomware. This article discusses the current state of ransomware in the manufacturing ...
By Or Malzman
on July 15, 2021
Background eFax is an online service that allows users to send and receive faxes directly via email. Cyber criminals are known to target services like eFax that leverage the user’s inbox to hide ...
By J Stephen Kowski
on July 14, 2021
The annual Verizon Data Breach Investigations Report (DBIR) provides analysis of information security incidents, with a specific focus on data breaches, which it defines as an incident that results ...
By Ian Thomas
on July 08, 2021
The sensitive nature of information gathered about patients makes healthcare organizations particularly vulnerable to ransomware attacks. Seeking a large payday, opportunistic hacking groups target ...
By David Habusha
on July 07, 2021
This week I joined IRONSCALES as the SVP of Product Management. Given my background in cybersecurity and enterprise software, I always thought of email security and phishing as a problem that was ...
By Ian Thomas
on June 24, 2021
Countries in East and Southeast Asia have been targeted with multiple high-profile ransomware attacks over the last 18 months. The attacks have hit companies of all sizes across a disparate range of ...
By Noah Gordon
on June 21, 2021
Introduction The cryptocurrency market has grown exponentially in recent years, with the total market capitalization of cryptocurrencies surpassing $200 billion. This rapid growth has caught the ...
By J Stephen Kowski
on June 20, 2021
At its core, your email security team has one simple goal: protect company emails from compromise. The solution they choose to meet that end often involves a patchwork of monitoring, data collection, ...
By Ian Thomas
on June 17, 2021
Being geographically quite isolated from the rest of the world does not mean anything when it comes to avoiding the widespread threat of ransomware. Operations at organizations across Australia and ...
By Noah Gordon
on June 16, 2021
Background The cryptocurrency market has been around for many years but gained a significant amount of interest during the pandemic. Naturally, the criminals followed, as they are always on the ...
By Julia Blachman
on June 16, 2021
I just joined IRONSCALES two weeks ago. Yes, you read that correctly: I have only been here for a few days and am already writing a blog about the inclusive workplace! Why? Because I get to be an ...
By Ian Thomas
on June 14, 2021
Vast wealth from natural resources, dynamic regional politics and a significant investment in technology have resulted in the Middle East becoming a fertile ground for ransomware and other types of ...
By Eyal Benishti
on June 11, 2021
Malicious cyber activity goes far beyond email security, with some estimates putting the cost to the U.S. economy between $57 billion and $109 billion in 2016 alone. The potential impact on the ...
By Ian Thomas
on June 09, 2021
Composed of South America, Mexico, Central America, and some Caribbean islands, Latin America is a large geographic area with a flourishing IT sector. Improved English proficiency, educational ...
By IRONSCALES
on June 08, 2021
We wanted to share a few key details about our latest release, which is now available.
By Noah Gordon
on June 06, 2021
The pandemic has reshaped the world in many ways, from how we work and how we shop. As their workforces went remote, companies rushed to move their applications to the cloud. As lockdowns forced ...
By Alex Paquette
on June 06, 2021
Many organizations love the comfort that comes with Secure Email Gateways (SEGs) rewriting URLs contained within an email, otherwise known as “safe links”. But is this perceived comfort actually ...
By Ian Thomas
on June 03, 2021
The IT sector in India continues to experience strong growth, powered by digital transformation initiatives across all industries. As a result, many Indian companies recognize the need to invest in ...
By Ian Thomas
on May 27, 2021
Cyber attacks targeting countries like the UK, United States, and Australia tend to receive the majority of media attention. However, large swaths of attacks continue to hit other parts of the world, ...
By IRONSCALES
on May 25, 2021
2021 has proven to be an exciting year for us at IRONSCALES! We continue to work hard every single day to provide our customers with the best email security solution on the market. While our focus ...
By IRONSCALES
on May 25, 2021
Earlier this month we announced that we were relaunching our Channel Partner Program with enhanced benefits. As part of the refresh, we refined our tiering structure to feature platinum, gold, silver ...
By Ian Thomas
on May 19, 2021
Ransomware attacks continue to wreak havoc on the IT systems of organizations, enterprises, small businesses, and even government services around the world. A rapid and unexpected shift to ...
By Eyal Benishti
on May 13, 2021
If you’re concerned that your security team may be suffering from fatigue, lacking motivation, or feeling overwhelmed… you’re not wrong. The industry is facing a dearth of qualified cybersecurity ...
By IRONSCALES
on May 12, 2021
We want to share a few key details about our latest release, which is now available.
By Eyal Benishti
on April 28, 2021
Email remains the most significant cyber security threat companies face today, which is reflected in a burst of recent M&A activity in this space. Both email security and related security ...
By Noah Gordon
on April 23, 2021
Background Cybercriminals continue to innovate their attack methods. IRONSCALES recently identified a specific attack that affected over 40 of our customers. In this instance, attackers impersonated ...
By Noah Gordon
on April 22, 2021
Background With several new two-dose COVID 19 vaccines being approved in the US by the FDA (from the companies Pfizer and Moderna), there was a rush of activity at multiple levels of government to ...
By Eyal Benishti
on April 20, 2021
Fifteen months ago, we all had a lot to learn. At that time, most of us had only scant details of a new virus, which had probably originated in China, and was apparently both more contagious and ...
By IRONSCALES
on April 13, 2021
We wanted to share a few key details about our latest release, which is now available. Quarantined Email Daily Digest In order to provide better visibility to end users regarding emails that were ...
By J Stephen Kowski
on April 12, 2021
Security Terms Explained: A Primer on Polymorphism During a recent client presentation, a member of our sales team (no doubt caught up in the excitement common to security professionals) used the ...
By Noah Gordon
on March 22, 2021
Background UPDATE as of 3/31
By Eyal Benishti
on March 19, 2021
Protect Yourself and Your Clients From Targeted Email Attacks Among the countless ways humans communicate, email remains one of the most popular. Embraced by individuals, businesses, academia, ...
By IRONSCALES
on March 19, 2021
We wanted to share a few key details about our latest release, which is now available.
By Noah Gordon
on March 17, 2021
Background Cybercriminals continue to innovate their attack methods. IRONSCALES recently identified a specific attack that affected over 90 of our customers. Specifically, the attackers tried to ...
By Ian Thomas
on March 12, 2021
Relief is here On Thursday, March 11, 2021, the President signed into law what is officially known as the American Rescue Plan (also known informally as the COVID relief bill.) This $1.9 TRILLION ...
By Eyal Benishti
on March 11, 2021
In this email security blog series, we’ve examined the most common phishing tactics, the techniques most commonly leveraged by threat actors and the many puzzle pieces found in email authentication ...
By Eyal Benishti
on March 09, 2021
So what exactly is going on? By now you’ve probably heard about the latest major cyber attack, named Hafnium. According to Microsoft, this is an attack by what appears to be a state-sponsored ...
By IRONSCALES
on March 07, 2021
IRONSCALES product release v35.01 brings the following new functionality to our customers.
By Eyal Benishti
on March 05, 2021
It was just about one year ago when offices around the world began shuttering, their occupants migrating from conference rooms and cubicles to home office spaces, dining tables, or whatever spot was ...
By Eyal Benishti
on March 05, 2021
A half-century has passed since the first electronic messages were sent via connected ARPANET computers. It was roughly a decade later than we began calling these transmissions “email.” In the ...
By Eyal Benishti
on March 01, 2021
In the previous post of this four-part series on the email security ecosystem, we highlighted both legacy and trending phishing techniques, such as business email compromise (BEC), spoofing, ...
By Eyal Benishti
on February 21, 2021
In the first blog post in this four part series, we explored the ten most common email phishing tactics and what makes each of them unique and challenging threats. For part two, we explore both ...
By Eyal Benishti
on February 15, 2021
As the email phishing threat landscape continues to rapidly evolve, understanding the totality of the email security and anti-phishing universe can be difficult for even the savviest of enterprise ...
By Noah Gordon
on January 25, 2021
In July 2020, threat actors preyed on pandemic-driven financial distress by launching a series of stimulus-related phishing attacks. As talks continue in DC to expand the stimulus, IRONSCALES ...
By Eyal Benishti
on January 16, 2021
As we say a not so fond farewell to 2020, it’s a good time to take a reflective look on what this past year brought to the world of email security. Verizon told us last May that 70% of all phishing ...
By Brendon Roddas
on January 01, 2021
In part two of this blog series, we explored the interdependencies of SPF, DKIM and DMARC; the limitations and vulnerabilities of each and addressed some of the unintended consequences of DMARC ...
By Brendon Roddas
on December 29, 2020
In our last blog post we discussed the hype around Domain-based Message Authentication, Reporting & Conformance (DMARC), the upcoming deadline for compliance to DHS’ Binding Operational Directive ...
By Brendon Roddas
on December 23, 2020
We’ve previously written a lot about DMARC, and despite the protocol having been in existence since 2011, it really did not enter into the spotlight as a mainstream email security solution until DHS ...
By Eyal Benishti
on December 15, 2020
A few years ago, I wrote in Dark Reading around the limitations of phishing education. What I was trying to emphasize in the article was that employees can be an organization’s weakest link - or its ...
By Tristan Bishop
on December 14, 2020
The fight to secure your organization grows more complex daily and the attack surfaces continue to expand. It is well known that email, and specifically phishing, remains among the most effective ...
By Lomy Ovadia
on December 07, 2020
The 200 million Microsoft Office 365 (O365) users worldwide are now being targeted by a new global spear-phishing attack spoofing Microsoft.com. Two weeks ago, IRONSCALES researchers first identified ...
By Eyal Benishti
on December 03, 2020
Phishing Scams to Watch Out For During an Unprecedented Holiday Shopping Season
By Eyal Benishti
on November 16, 2020
Earlier this year, FireEye reported that 86% of phishing attacks observed in Q2 did not contain malware. Subsequently, the annual Verizon Data Breach and Incident Response (DBIR) report concluded ...
By Brian Cesca
on October 29, 2020
Nonprofit organizations are the lifeline of many local communities, helping to meet important societal needs that are often under-addressed by government and private sector. While nonprofits scale in ...
By Tristan Bishop
on October 19, 2020
Cybercriminals have always attempted to exploit current events. This year, we’ve seen attempts to leverage COVID-19, Amazon Prime Day and even the new iPhone announcement to dupe recipients.
By IRONSCALES
on October 07, 2020
Following the outbreak of COVID-19, cyber criminals’ efforts to penetrate security defenses have only become more pronounced and aggressive, such as targeting remote voicemails and weak internet ...
By Eyal Benishti
on October 01, 2020
We’ve spent a lot of time in the past year educating the market about what a modern, self-learning email security platform consists of. From post-email delivery protection and decentralized ...
By Mordechai Worch
on September 23, 2020
In this post we will discuss the methodology and workflow of our ML team and walk through a case study of deploying a real machine learning model at scale. IRONSCALES is a cybersecurity startup that ...
By Eyal Benishti
on September 15, 2020
Today is a special and historic day for the entire world. For the first time since October 1994, Israel will normalize relations with two of its Middle East neighbors by signing a peace agreement ...
By Eyal Benishti
on September 09, 2020
Labor Day is unofficially known as the start of election season in the United States. While, of course, the cycle has seemed to be in full swing for over a year, now is the time when elections have ...
By Brendon Roddas
on August 24, 2020
If you follow our blog, then you may have read one of our many articles this year about the growing cyber threat of fake login pages. These nefarious yet often highly realistic looking pages are now ...
By Ian Baxter
on July 22, 2020
IRONSCALES researchers have identified a trending fake login attack spoofing two leading email delivery service providers, Mailgun and SendGrid. This phishing attack was discovered just weeks after ...
By Ian Baxter
on July 22, 2020
A recent report from Gartner showed worldwide IT spending is expected to reach $3.5 trillion this year, a 7.3% drop from 2019 due to COVID-19 – and yet it’s more important than ever for companies to ...
By Ian Baxter
on June 25, 2020
In a 2019 survey, 451 Research discovered that 46% of individuals believe that email is the number one data security threat to their organizations. This isn’t surprising – the reality is that 91% of ...
By Eyal Benishti
on June 10, 2020
Phishing attacks are rapidly morphing at scale: a Google report shows a 350% increase since quarantine. As such, many organizations are reviewing their email security stacks to determine what’s ...
By Ian Baxter
on June 04, 2020
With workforces largely remaining partially or fully remote, employees continue to rely on tools for greater efficiency and productivity. While we all know that software like Slack and Zoom have ...
By Eyal Benishti
on May 27, 2020
Combine Machine Learning With Human Intelligence To Fight Phishing Attacks Email phishing attacks pose a constant challenge to organizations and their users perhaps today more than ever. The days of ...
By Lomy Ovadia
on May 20, 2020
Stop me if you’ve heard this before: Phishing threats are constantly morphing at scale and the vast majority of businesses simply don’t have the time, money and resources to investigate each and ...
By Tristan Bishop
on May 13, 2020
Over the past few years, you’d be hard pressed to find an enterprise that wasn’t increasing their cybersecurity budget on an annual basis. In fact, Statista estimates that the global cybersecurity ...
By Brendon Roddas
on May 07, 2020
As businesses continue to deal with the impact of coronavirus and COVID-19, they face another unfortunate reality: Phishing scammers are working overtime to take advantage of the situation. We’ve ...
By Lomy Ovadia
on April 30, 2020
What will “normal” look like when people around the world start returning to the office? There are some examples from those areas of the world that are ahead of the United States on the curve, but it ...
By Einav Zeira
on April 02, 2020
The proliferation of email phishing attacks on businesses has increased exponentially given the advanced techniques and technologies that attackers have adopted to infiltrate inboxes. These attacks, ...
By Eyal Benishti
on March 26, 2020
A couple of days ago I had a phone conversation with a fellow security practitioner. We were exchanging thoughts regarding the new norm whereby both our companies were forced into a new ...
By Eyal Benishti
on March 10, 2020
If you live and breathe info security, you’re undoubtedly familiar with the many sobering statistics that chronicle the persistent challenges of email security and phishing attacks:
By IRONSCALES
on February 20, 2020
Cyberattackers are taking advantage of today’s fast-paced, connected world, where it’s not unusual for essential requests and transactions to be made over email. Unfortunately, with the help of their ...
By IRONSCALES
on January 20, 2020
With the proliferation of advanced email attacks, such as business email compromise (BEC), credential theft and polymorphic phishing attacks, email security has become a critical concern for ...
By Eyal Benishti
on January 13, 2020
Phishing websites, also known as spoofed websites, are a very common deception tactic that attackers now rely on to obtain a person’s login credentials to a legitimate website. The operation, ...
By Eyal Benishti
on December 30, 2019
As we approach the end of 2019 and the culmination of a chaotic decade for phishing attacks, it’s time we begin to look forward to the email security industry challenges and opportunities that lie ...
By Eyal Benishti
on December 03, 2019
Many organizations are reconsidering their email security strategy as they shift from on premise email to cloud-based applications. However, while cloud email systems from Google, Microsoft and ...
By Eyal Benishti
on November 18, 2019
Recently we teamed up with research-firm Aberdeen Group to host a webinar discussing the obstacles email security currently faces as well as solutions that include a blend of advanced technology and ...
By Eyal Benishti
on November 08, 2019
“We have to leverage AI in cybersecurity because [the bad actors] are using it against us,” says Eyal. “You can't bring a knife to a gunfight.” IRONSCALES founder and CEO, Eyal Benishti, recently sat ...
By Eyal Benishti
on October 31, 2019
Recently we teamed up with research-firm Aberdeen Group to host a webinar discussing the obstacles email security currently faces as well as solutions that include a blend of advanced technology and ...
By Eyal Benishti
on October 25, 2019
Back in the early days of my cybersecurity career, I worked as a malware analyst. Almost on a daily basis, I wrote and executed YARA rules to try to search and detect multiple instances of the same ...
By Eyal Benishti
on October 16, 2019
Warren Buffett once famously said that cyberattacks were “the number one problem faced by mankind,” exceeding even the threats from nuclear, biological and chemical weapons.
By Brendon Roddas
on October 08, 2019
With advanced email phishing attacks on the rise, more enterprises are turning to channel partners for help. Customers are also increasingly viewing their managed service provider’s (MSP) in the ...
By Lomy Ovadia
on September 18, 2019
The email security industry has become congested with manufactured trends and buzzwords, saturating the landscape with misused terminology as outdated platforms clamor to stay on top of advanced ...
By Eyal Benishti
on September 13, 2019
If there’s one thing that I’ve learned about American culture since moving to the U.S., it’s that the kickoff to the pro and college football seasons is what truly designates the start of the Fall ...
By IRONSCALES
on September 04, 2019
A new phishing campaign highlights the need for modern email security approaches in combating account takeover and credential theft.
By Brendon Roddas
on August 22, 2019
The concept of zero trust and Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) are currently two of the most important topics being discussed in the cybersecurity world. If you were at ...
By Brendon Roddas
on August 16, 2019
Our friend and veteran cybersecurity journalist Sean Michael Kerner recently authored an article for Infosecurity Magazine recapping a Black Hat USA session on email security. The session, “How to ...
By Eyal Benishti
on August 05, 2019
In the 2000s, Microsoft’s Encarta was far superior to Wikipedia in its accuracy and coverage of a vast array of topics. But that initial advantage didn’t last. Built on a centralized model, Encarta ...
By IRONSCALES
on July 24, 2019
TEL AVIV & ATLANTA - July 22, 2019 - IRONSCALES, the world’s first automated phishing prevention, detection and response platform, today announced that it has been named an Emerging Vendor by CRN ...
By Eyal Benishti
on June 27, 2019
I had a strong case of déjà vu while attending the recent Gartner Security and Risk Management Summit. That’s because a lot of what I heard from speakers on cybersecurity was familiar. It reflected ...
By Eyal Benishti
on June 17, 2019
As a result of our recent $15 million Series B, I am proud to announce that we are advancing on our journey toward bringing fully automated anti-phishing threat protection to inboxes across the ...
By IRONSCALES
on June 17, 2019
Traditional email security solutions such as secure email gateways (SEGs) are no match for today’s increasingly sophisticated email phishing and business email compromise (BEC) attacks.
By Brendon Roddas
on June 03, 2019
Threat intelligence feeds have been used for many years by security operations center (SOC) teams and security analysts as a means to stay ahead of trending cyberattacks. In theory, the concept of ...
By Brendon Roddas
on May 20, 2019
Did you know that any organization, regardless of its size and the number of in-house security personnel employed, can now automatically prevent, detect and respond to all types of sophisticated ...
By IRONSCALES
on April 11, 2019
In the days of Henry Ford, automobiles were all 5-speed manual transmissions that required drivers to push clutches and switch gears by band. Automatic transmissions then automated that part of ...
By IRONSCALES
on April 02, 2019
April 2, 2019– Atlanta & Tel Aviv - IRONSCALES, the world’s first automated phishing prevention, detection and response platform, today announced the results of new research proving that secure ...
By Brendon Roddas
on March 20, 2019
Let this sink in for a minute: in 2019, it is estimated that social media has exceeded 3 billion users around the globe, equating to more than one-third of the world’s population. If you were to ...
By Lomy Ovadia
on February 21, 2019
There are an endless number of buzzwords currently trending throughout the cybersecurity industry. From AI and automation to machine learning, threat hunting and offensive cyber, every month a new ...
By Eyal Benishti
on January 24, 2019
As we’ve written about before, email security originated in the early 2000s with anti-spam filters, followed by innovations in attack signature detection, which subsequently paved the way for secure ...
By Tristan Bishop
on January 01, 2019
Today, everything is automated. Our daily routines, our responses to simple questions such as “how was your day,” the train you take to get to work, the sell price for stocks – all automated. But ...
By Lomy Ovadia
on November 30, 2018
MEDIA ALERT: IRONSCALES & SNDBOX IDENTIFY A NEW MALWARE VARIANT BEING SENT OVER EMAIL EFFECTING MS OFFICE 365 USERS New threat uses a malicious #RTF file to infect machines with maldoc file ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
By Tristan Bishop
on November 05, 2018
Like many cybersecurity vendors, central to our success has been our Partnership Program, which we built and customized to accelerate adoption of our advanced phishing threat protection platform ...
By Tristan Bishop
on August 15, 2018
In case you missed it, we were recently named to the “Emerging Vendor 2018: Cybersecurity Companies You Should Know” list by CRN. This recognition is not only indictive of the progress we have made ...
By Eyal Benishti
on August 07, 2018
Artificial intelligence is something we continue to see discussed- Elon Musk believes it will be the downfall of humanity, many are concerned its implementation could leave thousands out of jobs, and ...
By Brendon Roddas
on July 31, 2018
As part of our recent market research project to gain a better understanding of how organizations are handling email borne cyber threats we polled the views of 300 IT and security professionals who ...
By Eyal Benishti
on July 16, 2018
Ever since email went mainstream, hackers and spammers have been bombarding inboxes with unwanted messages, phony ads, fraudulent links and viruses. And every time internet service providers (ISPs) ...
By Brendon Roddas
on July 03, 2018
We were exhibiting this year at Infosecurity Europe and, over the three days, we polled visitors to get a sense of how they were handling email security. From the 300 people we spoke with, 54% said ...
By Eyal Benishti
on June 19, 2018
Six months ago we wrote about how ransomware dominated 2017. Six months later, not much has changed.
By Eyal Benishti
on May 31, 2018
With cyber risk from ransomware and business email compromise (BEC) proliferating among companies of all sizes, cybersecurity analysts must work harder than ever to create new security policies, ...
By Eyal Benishti
on May 09, 2018
As email phishing grows more sophisticated and remains a primary attack vector for data breaches, many security providers are attempting to step up their solutions to better mitigate risk. Microsoft ...
By Eyal Benishti
on April 26, 2018
In April [2018], the UK’s National Cyber Security Centre (NCSC) published its Active Cyber Defence (ACD) Programme which urged companies to employ the Domain-based message authentication, reporting ...
By Eyal Benishti
on April 12, 2018
Business Email Compromise attacks (BECs) have been causing organizations problems for years, with the problem getting worse. The reason they’re so difficult to deflect is that, unlike typical email ...
By Eyal Benishti
on April 04, 2018
The origins of fraud date back to the ancient Greek and Roman empires, when savvy merchants cooked up schemes to borrow money from lenders only to avoid paying back their debts. Fast-forward ...
By Eyal Benishti
on March 21, 2018
Artificial Intelligence (AI) has been heralded by many as a revolutionary technology that is going to replace humans - eventually. While that may be a while away yet, in the cybersecurity industry ...
By Eyal Benishti
on March 12, 2018
The Rise of Business Email Compromise (BEC): Did you know that, according to Aberdeen, within 80 seconds of a phishing message arriving in an organization, someone has interacted with the message, ...
By Eyal Benishti
on February 21, 2018
What’s Next for Phishing Awareness Training Providers? Advanced Phishing Threat Protection with IRONSCALES
By Eyal Benishti
on February 08, 2018
Phishing Awareness Training Solutions Phishing Awareness Training focused solutions are not aligned with today’s advanced persistent threats, business email compromise and ransomware attacks that ...
By Eyal Benishti
on February 06, 2018
As ransomware ran amock last year we take a retrospective look at what actually transpired At the start of 2017, many had already designated 2016 as the ‘year of ransomware,’ and with good reason. ...
By Eyal Benishti
on January 30, 2018
Netflix is quickly becoming a popular brand for fraudsters to spoof in phishing campaigns. Neflix has been impersonated by criminals in the last 12 months in various, increasingly sophisticated, ...
By Eyal Benishti
on January 22, 2018
Complimenting DMARC From small businesses to federal agencies and Fortune 500s, no one is immune from the risk of a cyberattack. And as we’ve written about extensively before, phishing remains the ...
By Eyal Benishti
on January 09, 2018
Phishing is something that just doesn’t seem to want to go away. With the first phishing email believed to have been sent in the mid 1990’s, most people did not realise the existence of phishing ...
By Eyal Benishti
on December 28, 2017
By many measures, 2017 was a rough year for cybersecurity with large, brazen phishing attacks negatively impacting governments and companies around the world. Even some of the most supposedly ...
By Eyal Benishti
on December 19, 2017
IRONSCALES founder and CEO, Eyal Benishti was recently invited back to The Peggy Smedley Show, the podcasting voice of IOT and digital transformation, to continue their discussion on artificial ...
By Eyal Benishti
on December 18, 2017
To say that this year has been eventful for email security is an understatement. From continued nation-state attacks to large scale breaches, phishing and other email attacks have continued to enter ...
By Eyal Benishti
on December 06, 2017
Looking Beyond our Series A Funding: Why Our Automated Email Phishing Detection and Response is the Next Big Thing in Cybersecurity In case you missed it - IRONSCALES announced (link to press ...
By Eyal Benishti
on November 14, 2017
Security Awareness Training Companies We’ve written a lot this past year on employee security awareness training, including how to measure ROI; how it must work in tandem with machine learning ...
By Eyal Benishti
on October 31, 2017
In email security we regularly discuss the prevalence, and pure dominance, of phishing attacks and their impact on the world. We’ve previously proclaimed 2016 as having been the year in which ...
By Eyal Benishti
on September 05, 2017
A recent report from FireEye cites the average time from an email phishing breach to detection is 146 days globally, and a colossal 469 days for the EMEA region. According to the report, “At a basic ...
By Eyal Benishti
on August 15, 2017
In our last blog post, we discussed the complexities of email phishing and the role of automation in expediting the forensics phase. In it, we highlighted that, despite a phishing-informed workforce ...
By Eyal Benishti
on July 31, 2017
We recently wrote about the most prominent phishing attacks so far in 2017. Such attacks have led to record-breaking ransomware payments of more than $100 million; impersonations of CEOs at major ...
By Eyal Benishti
on July 11, 2017
Last December, we proclaimed 2016 to be the year in which phishing went mainstream. Fast-forward just six months into 2017, and it already appears that phishing will have an even greater impact on ...
By Eyal Benishti
on June 20, 2017
According to Cybersecurity Ventures, global cybersecurity spending will exceed $1 trillion cumulatively over the next five years. With the massive number of cyber defenses, strategies and services ...
By IRONSCALES
on June 17, 2017
Cyber criminals and hackers are capitalizing on COVID-19 to exploit fear, uncertainty and doubt – and with employees largely working from home, risk is proliferating at an accelerated clip.
By Brendon Roddas
on May 16, 2017
Over the past year, it feels like not a single day goes by without learning of a major cyberattack that originated via a phishing or spear-phishing campaign. In fact, at the time of writing this blog ...
By Ian Thomas
on May 09, 2017
Your blog post Last month, the United States Department of Justice (DOJ) announced the arrest of a Lithuanian man for allegedly stealing $100 million from two U.S.-based tech companies. While the ...
By Eyal Benishti
on March 21, 2017
Phishing Links We’ve talked over and over again about just how big of a problem phishing has become. Unfortunately, recent reports suggest that the epidemic is getting even worse. In 2016 alone, the ...
By Eyal Benishti
on March 07, 2017
The world’s largest cybersecurity event, RSA Conference, took place earlier this month in San Francisco, bringing together top security leaders and pioneers from all over the globe to discuss the ...
By Eyal Benishti
on February 06, 2017
Hackers and cyber criminals have responded to the adoption of employee phishing awareness training, by improving the sophistication and deceptiveness of their attacks.
By Eyal Benishti
on January 17, 2017
Ransomware has been the most prevalent cyber threat since 2005 However, recent ransomware events have proven that the threat is increasing significantly in both frequency and complexity – so much so ...
By Eyal Benishti
on December 15, 2016
A decade from now, people may very well look back on 2016 as the year phishing became a mainstream concern. That’s because, in just the past 12 months, millions of high-profile organizations, ...
By Eyal Benishti
on November 21, 2016
What does a prominent cyber attack against a German Steel Mill; a damaging cybersecurity event against a power plant in Ukraine and an attempted ransomware attack against Israel’s Electric Authority ...
By IRONSCALES
on November 06, 2016
Earlier this year, John Podesta, the campaign chair for Hillary Clinton, the Democratic candidate for President of the United States, had his personal Gmail account compromised. U.S. intelligence has ...
By Eyal Benishti
on October 31, 2016
According to the American Board of Professional Liability Attorneys (ABPLA), “medical malpractice occurs when a hospital, doctor or other health care professional, through a negligent act or ...
By Eyal Benishti
on September 26, 2016
Despite unprecedented cybersecurity budgets, some of which now exceed hundreds of millions of dollars per year, financial services institutions remain atop the most targeted industry list. In fact, ...
By Eyal Benishti
on September 12, 2016
Imagine for a minute that you are the CISO of a financial institution. One morning, a member of your security team hastily awakens you and informs that a major ransomware attack took place overnight. ...
By Brendon Roddas
on August 23, 2016
Sophisticated cyberattacks are on the rise, and organizations of all sizes are feverishly working harder than ever to mitigate the risks. Currently, SOC (Security Operations Center) teams play an ...
By IRONSCALES
on August 09, 2016
This year’s Black Hat conference had no shortage of valuable training sessions and exciting keynote speakers. But for IRONSCALES, the five-days in Las Vegas was highlighted by the opportunity to meet ...
By Eyal Benishti
on July 10, 2016
According to a recent study by SANS, 95% of all attacks on enterprise networks are the result of successful spear phishing. Other research by Ponemon Institute shows that the average loss on such ...
By IRONSCALES
on April 16, 2016
The rise of the Digital Age has spurred interconnectivity between businesses and industries, regardless of geography and market. Unfortunately, an unintended consequence of this connectivity is the ...
By IRONSCALES
on April 06, 2016
NEW YORK — Locky was stopped in its tracks by IRONSCALES, creator of the patent-pending automated Phishing mitigation response system, and ReSec Technologies, developer of the patented Content Disarm ...
By Eyal Benishti
on February 23, 2016
In today’s high-stakes corporate environment, you might think that it would be pretty hard to hack a company like yours.
By Eyal Benishti
on January 25, 2016
“That’s Crazy— We’re keeping all our user’s data in a f*cking vault ” I shouted a second before I hanged up my car phone, on my way to drop my kids off to school. I kissed them goodbye, and secretly ...
By Eyal Benishti
on January 19, 2016
Recent alerts from security vendors Kaspersky Labs and Mimecast warned about a current rise in both phishing and whaling activity, urging their users to take precautions and minimize their risk of ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right