
New vulnerabilities, new attacks. New technologies, new attacks. New defenses, new attacks. Keeping up with the newest attack methods is almost as hard as keeping up with ChatGPT-based apps, ...
Secure Email Gateways (SEG)s have been a staple in many organizations’ strategies to curb email phishing and spam messages from disrupting business and targeting employees. They’ve become so ...
The phishing landscape is morphing rapidly. Cybercriminals are devising various attacks leveraging new tactics and technology to evade traditional, rule-based email security solutions and static-AI ...
It’s easy for organizations to get so caught up in trying to win new deals that they forget about their existing customers. But that isn’t the case at IRONSCALES. Our customers are a part of our ...
The IRONSCALES team was thrilled to attend RSA Conference 2023 in San Francisco. The conference brought together 43,000 cybersecurity industry experts and thought leaders from across the globe. There ...
Artificial intelligence (AI) is revolutionizing various domains with its ability to learn, adapt, and evolve in response to new information and changing environments. One crucial element in creating ...
Emerging threats that evade traditional defenses, credential theft, and business email compromise payment scams are on the rise
AI is eating the world. That may be extreme, but you can't scroll through your LinkedIn feed without seeing tips for using AI to accomplish a task or read an AI-generated post. The truth of it is AI ...
IRONSCALES is sweeping the cybersecurity awards scene this Spring! As the leading enterprise email security provider, IRONSCALES has racked up an impressive number of accolades in recent months. With ...
Are you looking for a powerful email security solution to help protect your organization from advanced phishing threats like BEC, ATO, and ransomware? We have exciting news—IRONSCALES has been ...
Phishing has been a constant threat in cybersecurity, and as technology evolves, so do the tactics employed by cybercriminals. Advanced phishing threats have become increasingly sophisticated, making ...
RSA Conference is right around the corner, and we are thrilled to be attending this year's event. If you're attending RSAC in San Francisco, stop by booth 5215 to discuss email security and our ...
Let’s get straight to the point, email-based attacks present a serious security threat for organizations today, especially enterprises. In 2022, Verizon’s Data Breach Investigations Report found that ...
Email is a primary method of business communication—making it also one of the most exploited attack vectors for cybercriminals. With the rise of Business Email Compromise (BEC) attacks, it's becoming ...
With all the recent focus on education and prevention of business email compromise (BEC) attacks, have the numbers gone down? Nope. In fact, the number of BEC attacks is significantly rising.
Attackers regularly leverage email to launch their attacks on the enterprise. With new tactics and technologies to exploit vulnerabilities, like launching Business Email Compromise (BEC) attacks, ...
We’ve been writing a lot about business email compromise attacks lately (six blogs and one research whitepaper since Jan 1st). So, I thought it would be good to provide some historical context.
“Large organizations (with 10,000 or more employees) anticipate a 43.3% increase in the threat of BEC attacks in the next 12 months.” That’s just one of the many interesting data points from the new ...
Attackers never stop looking for new ways to target individuals and defraud organizations. And the recent collapse of Silicon Valley Bank (SVB) and Signature Bank has provided cyber criminals a ripe ...
What is BEC Payroll Diversion? Payroll diversion is a type of business email compromise (BEC) attack that occurs when a scammer successfully manipulates payroll credentials in order to defer direct ...
Last month, Gartner published their findings and recommendations from 1,500+ customer interactions in the 2023 Gartner Market Guide for Email Security. The bad news is that despite the technology in ...
Phishing and BEC attacks are serious threats to any organization and have become increasingly common in recent years. These attacks can have severe consequences for organizations, including financial ...
While 90% of all cyber breaches originate from phishing emails, traditional anti-phishing solutions have done a poor job of preventing advanced attacks. Cybercriminals have evolved tactics and ...
The IRONSCALES team is thrilled to announce a new strategic partnership with Yellow Cube — our new Central and Eastern European (CEE) Value-Added Distributor (VAD). Operating across 22 countries in ...
GPT-3 has been around for over a year now but didn’t start gaining popularity until ChatGPT coupled it with Reinforcement Learning from Human Feedback (RLHF). RLHF is a machine-learning technique ...
The phishing problem isn’t going away anytime soon. In reality, it’s getting worse as attackers adopt new tools and strategies to bypass traditional tools and coax their victims into responding to ...
IRONSCALES, the leading enterprise cloud email security platform, has launched its new community platform for cybersecurity experts – IRONSCALES Connect The IRONSCALES Connect community is an ...
IRONSCALES version 64.00.00 release includes capabilities to ease management efficiency and launch a phishing simulation campaign in under three clicks. Below are just some of the enhancements ...
ChatGPT is a powerful machine learning-based text generation tool that can generate highly sophisticated and realistic text, making it a dangerous tool for criminals writing phishing emails. The ...
State and local government agencies store, utilize, and send massive amounts of sensitive information on a daily basis. When handling data such as personal and financial records and other significant ...
The CFO’s role in cybersecurity is often overlooked. Yet, they can be a vital partner with a CISO in risk management to protect the financial security of an organization and maximize return on ...
With the v63.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Phishing simulation campaigns are vital for businesses to test their employee's security awareness and ability to help protect against cyber threats. As cyber threats become more sophisticated and ...
The cybersecurity industry has been talking about collaborative approaches forever. In fact, the cyber community has been using a collaborative approach for a long time on things like the ...
The 62.00.00 release of IRONSCALES includes several Simulation & Training, and Incident Management enhancements, as well as some bug fixes.
Phishing attacks are surging. As a result, threat actors are quickly evolving their tactics to bypass legacy systems and deceive vulnerable targets, causing IT and Security teams to spend more time ...
BEC, or Business Email Compromise, is a type of cybercrime that has become increasingly common in recent years. It involves hackers sending emails that appear to be from trusted sources, such as ...
We just launched the following improvements and new features in the v61.00.00 release of IRONSCALES.
This post was originally published on December 03, 2020, and has since been updated for relevancy and accuracy. ‘Tis the season for cybercriminals to launch email phishing scams as they seek to take ...
Threat actors constantly tweak and refine their tactics in an attempt to evade detection or become more efficient at achieving malicious goals. Often, these tactical adjustments exploit societal ...
We're pleased to announce the following improvements and new features included in the v60.00.00 release of IRONSCALES. Check them out below.
It’s well known that a good security strategy calls for layers of protection to thwart bad actors from quickly accessing sensitive data. While many organizations have a secure email gateway deployed ...
Sometimes I hear the following from security professionals when we talk about their awareness program:
Cybercriminals have relied on phishing emails as a gateway to gaining access to sensitive information since the beginning of email. And reports indicate that this isn’t slowing down. For threat ...
Earlier this year, we launched IRONSCALES™ Starter™, our free email security software solution. And since then, it has become a very popular option with IT security admins who need to deliver ...
Almost every business or organization is a target for account takeover (ATO) attempts. There’s a good chance that your organization is vulnerable.
We recently published a report named “The Business Cost of Phishing” that provides insights into the challenges faced by IT and Security teams in their fight against this highly prevalent type of ...
For good and bad, AI is now more accessible and used for things from writing articles to identifying phishing threats. For anti-phishing, AI accessibility is beneficial for building better cyber ...
With the v59.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
It may be wrong to admit, but I love a good con. It is the art of deception that fascinates me the most. Watching a con artist at work is enthralling and fills me with a mix of surprise at their ...
Defense in depth is a common practice in both the physical and the cyber security realms. We create multiple layers to complement each other; each layer assumes its predecessor failed.
The Artificial Intelligence (AI) vs. Human Insights (HI) debate has been discussed a lot in the past few years. There is no doubt that AI can outperform humans in specific areas and even beat the ...
With the v58.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features.
Cybersecurity Awareness month is right around the corner. As such, you may be assessing your business’s risk profile to identify weaknesses and targets. With phishing attacks being a leading cause of ...
With the v57.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features.
URL Rewriting, a service used to sandbox and defang malicious URLs by sending users to a portal that displays the URL in the sandboxed environment, has many well-known weaknesses and a few that may ...
In 2022, a large-scale phishing campaign successfully compromised IT resources at over 130 organizations, many of which were high-profile companies. Code-named 0ktapus, the threat group behind this ...
A researcher at IRONSCALES recently discovered thousands of business email credentials stored on multiple web servers used by attackers to host spoofed Microsoft Office 365 login pages. The ...
Account takeover (ATO) attacks involve threat actors gaining access to and control over legitimate user accounts. After taking control of a user’s account, the malicious actor then uses the account’s ...
With the v56.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features.
Evil Corp is a cybercrime gang notorious for its prolific malware-based hacking schemes leading to payments exceeding $100 million from various financial institutions and other businesses. The ...
When it comes to email security, no amount of technology can completely stop the threat of phishing attacks. As the threat landscape evolves and cybercriminals identify new methods to breakthrough ...
Cyber security is a tough challenge, and it's getting harder to keep up with the latest threats. AI-powered tools leveraging machine learning can help detect phishing attacks by analyzing huge ...
For organizations dealing with phishing attacks, it may seem like an easy solution to stopping the attacks is just to block the attacker. Turns out that isn’t the case. Let’s look at why this ...
Every family has its IT guy, ours is Raphael and he is great at it. Embracing this position within the family he married into, Raph faithfully keeps us updated on WhatsApp with interesting articles ...
With the v55.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Many people don’t know that IRONSCALES started as a Security Awareness Training company. While working as a security researcher at a technology company, Eyal Benishti (our founder & CEO) had a ...
At IRONSCALES we work hard every day to provide our customers with the very best experience possible, the foundation of which is our amazing Customer Success team. As a data-driven organization, we ...
While several high-profile ransomware gangs saw a steep rise and an equally sharp decline over the last couple of years, Cuba ransomware somewhat slipped under the radar. With the gang behind Cuba ...
With the v54.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features.
The email security market is full of vendors offering a wide array of features and capabilities. To make sense of the chaos and to bring clarity to companies seeking the right solution for their ...
It has been six weeks since I joined IRONSCALES, and WOW...what a ride!
Cryptocurrency is a digital medium of exchange that is not associated with traditional currency-issuing institutions like national banks. Instead, cryptocurrency is managed using blockchain ...
With the v53.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features.
After a cull that saw several high-profile ransomware gangs disbanded in late 2021 a new set of groups emerged in their place. One gang with a particularly rapid rise over the last few months in ...
OpenSea, the largest non-fungible token (NFT) marketplace, disclosed a breach on their blog on June 29, stating that an employee of Customer.io, their email delivery vendor “misused their employee ...
What Is Smishing? Smishing is a type of social engineering scam that uses mobile texting rather than emails to deliver nefarious messages that dupe people into taking specific actions. The term is a ...
With the v52.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
What is Business Email Compromise? Business email compromise (BEC) is a type of targeted phishing (spear phishing) in which a threat actor either accesses or mimics a genuine business email account ...
EMOTET malware is a banking trojan that was initially spotted in 2014, disappeared for a while, and then reappeared in 2018. EMOTET is typically spread through phishing emails with malicious ...
The World Cup Ticketing Scam If you're one of the estimated 3 million football/soccer fans looking to buy tickets to this year’s FIFA World Cup, beware of fake emails like the one below. There have ...
With the v51.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
With the v50.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Higher education institutions are prime targets for ransomware attacks. Universities and colleges handle large amounts of sensitive personal data, facilitate a campus-wide intranet, and manage ...
With the v49.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Collaboration tools like Microsoft Teams are now a big part of everyday working life – we use these tools constantly to communicate with employees across our organization. Here are just a few data ...
I was first exposed to the idea of micro-expressions by Lie to Me, a crime series inspired by the work of Paul Ekman, professor emeritus at UCSF and advisor to law enforcement. By analyzing ...
The ongoing conflict between Russia and Ukraine poses cyber threats that extend beyond Ukraine’s borders across the entire EMEA region. Cyber attacks are a significant part of Russia’s military ...
With the v48.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Phishing remains the leading cause of ransomware attacks and shows no signs of slowing down. Leading MSPs around the globe recognize this issue and are constantly on the lookout for email security ...
One of the exciting updates included in our recent Megalaunch announcement was enhanced account takeover (ATO) detection and remediation. Before we highlight the updates, let’s do a quick overview of ...
With our v47.00 release, we are excited to roll out our new Email Protect™ and Complete Protect™ plans. These new plans better align with IRONSCALES’ goal of being a comprehensive messaging security ...
We are excited to share the news that our biggest launch ever at IRONSCALES, which we’re calling Megalaunch, is here! With this launch, we are rolling out new packages, introducing new capabilities, ...
With the v46.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Analysis of Microsoft O365 Credential Phishing with Employee Manual Updates Attack Summary Details Impacted IRONSCALES customer mailboxes: 506 Impacted IRONSCALES customers: 269 Security Bypass: ...
International law enforcement collaboration led to the disbandment of several high-profile ransomware gangs in the last 12 months. As ransomware attacks gained more media coverage and wreaked more ...
With the v44.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Ransomware attacks continue to be a problem for companies around the world. As these attacks surge, many high-profile incidents have made headlines across Africa. This article highlights some of the ...
FIN7 is a unique group in the shady world of cybercrime. Infamous for sophisticated stolen credit and debit card hacks involving phishing emails and other social engineering methods, the gang’s ...
Netwalker is a notorious name on the ransomware scene with a prolific record of successful attacks. An estimated $25 million in ransom extortions between March and September 2020 established the gang ...
Separating Fact from Fiction “Yeah, I get it, but I just don't trust users; they always screw everything up,” lamented the Director of IT, while on a recent sales call featuring our dynamic ...
2021 was a big year for cybersecurity — and not in a good way.
With the v43.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
As we approach the end of the year, IRONSCALES would like to say THANK YOU to each and every one of our customers. Together, we are paving the best-in-class, modern approach to email security. Your ...
Ragnarok is a ransomware gang known for the Ragnar Locker ransomware, which has impacted a range of high-profile organizations from video game developers to energy companies. This article looks at ...
I am excited to announce our Series C investment of $64M, led by PSG, a leading growth equity firm partnering with software and technology-enabled service companies, with participation from existing ...
With the v42.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Babuk is a new ransomware gang that emerged in early 2021. The gang’s initial mission statement referenced a non-malicious intent to conduct ransomware attacks as an apparent audit of the security of ...
DoppelPaymer is a ransomware gang that extracts data from victims’ systems and then encrypts those same systems. Named after the strain of ransomware that the gang deploys, DoppelPaymer has ...
Hackers can use their abilities to do good, to do bad and sometimes just to show what they can do. The last option was the case for this scenario.
Egregor is a ransomware-as-a-service gang that has so far managed to claim at least 70 victims and extort tens of millions of dollars during a prolific yet short spell of operations. The Egregor ...
With the v41.00.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Clop is a ransomware gang that first appeared in February 2019 when security researchers found new ransomware strains with the .Cl0p extension. A spate of prolific and high-profile attacks within a ...
DarkSide is a ransomware gang that quickly made waves in the cybersecurity world with a range of high-profile attacks. After first notifying the world of their operations in an August 2020 dark web ...
With the v39.00.01 release of IRONSCALES, we are pleased to announce product improvements and new features.
Secure Email Gateways (SEGs) have been around for two decades. They were built to provide security for on-premises email deployments and were placed at the perimeter of a company’s security ...
Conti is a ransomware gang that has managed to wreak havoc on many organizations within just a short time. After first appearing in media headlines as recently as 2019, Conti has been behind several ...
Email Phishing is Biggest Security Threat To Businesses, According to IT Professionals
Fostering channel partnerships with reputable value-added resellers (VARs) has become an important component of most cybersecurity companies' go-to-market strategies. Challenged by what seems like ...
Background The IRONSCALES research team has recently identified a social engineering phishing scam that leverages confusion and disinformation about people and corporate COVID vaccine requirements to ...
Google’s Gmail for Business has had an overhaul and now claims to offer AI-powered security features. According to its marketing materials, it will now offer advanced protection against phishing and ...
REvil is a notorious ransomware gang responsible for multiple high-profile cyber attacks targeting companies of all sizes. This article explores REvil’s origins, the types of malware payloads used by ...
“Rollin' in my 5.0. With my rag-top down so my hair can blow.”
With the v40.00 release of IRONSCALES, we are pleased to announce the following product improvements and new features:
Ransomware in Pharmaceutical Overview The pharmaceutical industry is comprised of public and private organizations focused on the research, development and manufacturing of drugs and medication. The ...
“I know I hear you talk about this all the time, but what is ransomware exactly?” my wife asked as we watched the evening news. Apart from being a great question, it’s one that a lot of folks have ...
Meeting the demands of modern digital-oriented customers has resulted in widespread digital transformation initiatives in the financial services industry. The new digital ecosystem harnesses ...
The mining industry encompasses organizations focused on the exploration for and extraction of valuable minerals and other elements from the Earth. Given the critical need to provide these minerals ...
From cloud backup to consulting to managed detection and response, businesses of all sizes leverage a number of IT services. These services add value to organizations through cost-effective ...
The agriculture industry spans a diverse range of businesses from growing crops, raising animals, and harvesting fish and other animals from a farm, ranch, or their natural habitats. Given the ...
Phishing remains the leading cause of ransomware attacks and shows no signs of slowing down. Leading MSPs around the globe recognize this issue and are constantly on the lookout for email security ...
The media and entertainment industry spans a diverse range of businesses from newspaper publishers to television broadcasters. Common to most business models within media and entertainment is a high ...
Telecommunications providers keep the world connected through phone calls, emails, the Internet, and television. It’s easy to take telecommunications services for granted until they suffer ...
Ransomware attacks pose serious cybersecurity risks for companies in the hospitality industry, which is a broad sector that includes hotels, tourism agencies, restaurants, and bars. Common to these ...
With the v38.00 release of IRONSCALES, we are pleased to announce product improvements and new features. Some of the release highlights include improved visibility to the recipients of a phishing ...
Ransomware attacks pose serious cybersecurity risks for retailers. If an attack manages to disrupt customer-facing operations during peak business periods, it could have a disastrous effect on a ...
Businesses in the energy sector produce, extract, sell, and supply various sources of energy. These energy sources include oil and gas reserves, nuclear energy, and renewable energy for fuel and to ...
Attack Summary Attack Description: FileShare Platform Credential Theft Impacted Mailboxes: 210 Number of Impacted Customers: 42 Security Bypass: SPF, DMARC, Third-Party Visual Scanners Payload: ...
Background The IRONSCALES research team has recently noticed an alarming increase in the exploitation of legitimate file sharing services to deliver phishing attacks. Specifically, we are seeing ...
Office 365 Mailbox Sync Enhancement The IRONSCALES automatic mailbox sync for Microsoft Office 365 was recently enhanced. Unlicensed Office365 mailboxes that cannot be protected will not sync to ...
Transportation companies provide critical functions in shipping products and carrying people to their destinations. Encompassing both transport and logistics companies, the transportation sector is ...
Enhanced Account Takeover (ATO) Protection (for O365 users only) ATO is a type of identity theft in which a cyber-criminal gains unauthorized access to a legitimate user’s online account. Once the ...
Organizations in the Legal industry, such as law firms, rely on IT for many of their critical operations. The very nature of this industry makes them prime candidates for ransomware attacks. Law ...
Background CLOP is a notorious high-profile ransomware group that has compromised industries globally. Like other ransomware groups, CLOP hosts a leak site to pressure their victims into paying the ...
Disrupting operations at manufacturing plants is a potentially lucrative path for threat actors specializing in ransomware. This article discusses the current state of ransomware in the manufacturing ...
What Is an eFax Message? eFax is an online service that allows users to send and receive faxes directly via email. Unfortunately, cybercriminals are known to target services like eFax that leverage ...
The 2021 Verizon Data Breach Investigations Report (DBIR) provides an analysis of information security incidents, with a specific focus on data breaches, which it defines as an incident that results ...
The sensitive nature of information gathered about patients makes healthcare organizations particularly vulnerable to ransomware attacks. Seeking a large payday, opportunistic hacking groups target ...
This week I joined IRONSCALES as the SVP of Product Management. Given my background in cybersecurity and enterprise software, I always thought of email security and phishing as a problem that was ...
Countries in East and Southeast Asia have been targeted with multiple high-profile ransomware attacks over the last 18 months. The attacks have hit companies of all sizes across a disparate range of ...
Introduction The cryptocurrency market has grown exponentially in recent years, with the total market capitalization of cryptocurrencies surpassing $200 billion. This rapid growth has caught the ...
At its core, your email security team has one simple goal: protect company emails from compromise. The solution they choose to meet that end often involves a patchwork of monitoring, data collection, ...
Being geographically quite isolated from the rest of the world does not mean anything when it comes to avoiding the widespread threat of ransomware. Operations at organizations across Australia and ...
Background The cryptocurrency market has been around for many years but gained a significant amount of interest during the pandemic. Naturally, the criminals followed, as they are always on the ...
I just joined IRONSCALES two weeks ago. Yes, you read that correctly: I have only been here for a few days and am already writing a blog about the inclusive workplace! Why? Because I get to be an ...
Vast wealth from natural resources, dynamic regional politics and a significant investment in technology have resulted in the Middle East becoming a fertile ground for ransomware and other types of ...
Malicious cyber activity goes far beyond email security, with some estimates putting the cost to the U.S. economy between $57 billion and $109 billion in 2016 alone. The potential impact on the ...
Composed of South America, Mexico, Central America, and some Caribbean islands, Latin America is a large geographic area with a flourishing IT sector. Improved English proficiency, educational ...
We wanted to share a few key details about our latest release, which is now available.
The pandemic has reshaped the world in many ways, from how we work and how we shop. As their workforces went remote, companies rushed to move their applications to the cloud. As lockdowns forced ...
Many organizations love the comfort that comes with Secure Email Gateways (SEGs) rewriting URLs contained within an email, otherwise known as “safe links”. But is this perceived comfort actually ...
The IT sector in India continues to experience strong growth, powered by digital transformation initiatives across all industries. As a result, many Indian companies recognize the need to invest in ...
Cyber attacks targeting countries like the UK, United States, and Australia tend to receive the majority of media attention. However, large swaths of attacks continue to hit other parts of the world, ...
2021 has proven to be an exciting year for us at IRONSCALES! We continue to work hard every single day to provide our customers with the best email security solution on the market. While our focus ...
Earlier this month we announced that we were relaunching our Channel Partner Program with enhanced benefits. As part of the refresh, we refined our tiering structure to feature platinum, gold, ...
Ransomware attacks continue to wreak havoc on the IT systems of organizations, enterprises, small businesses, and even government services around the world. A rapid and unexpected shift to ...
If you’re concerned that your security team may be suffering from fatigue, lacking motivation, or feeling overwhelmed… you’re not wrong. The industry is facing a dearth of qualified cybersecurity ...
We want to share a few key details about our latest release, which is now available.
Email remains the most significant cyber security threat companies face today, which is reflected in a burst of recent M&A activity in this space. Both email security and related security ...
Background Cybercriminals continue to innovate their attack methods. IRONSCALES recently identified a specific attack that affected over 40 of our customers. In this instance, attackers impersonated ...
Background With several new two-dose COVID 19 vaccines being approved in the US by the FDA (from the companies Pfizer and Moderna), there was a rush of activity at multiple levels of government to ...
Fifteen months ago, we all had a lot to learn. At that time, most of us had only scant details of a new virus, which had probably originated in China, and was apparently both more contagious and ...
We wanted to share a few key details about our latest release, which is now available. Quarantined Email Daily Digest In order to provide better visibility to end users regarding emails that were ...
Security Terms Explained: A Primer on Polymorphism During a recent client presentation, a member of our sales team (no doubt caught up in the excitement common to security professionals) used the ...
Protect Yourself and Your Clients From Targeted Email Attacks Among the countless ways humans communicate, email remains one of the most popular. Embraced by individuals, businesses, academia, ...
We wanted to share a few key details about our latest release, which is now available.
Background Cybercriminals continue to innovate their attack methods. IRONSCALES recently identified a specific attack that affected over 90 of our customers. Specifically, the attackers tried to ...
Relief is here On Thursday, March 11, 2021, the President signed into law what is officially known as the American Rescue Plan (also known informally as the COVID relief bill.) This $1.9 TRILLION ...
In this email security blog series, we’ve examined the most common phishing tactics (Part 3), the techniques most commonly leveraged by threat actors (Part 2), and the many puzzle pieces found in ...
So what exactly is going on? By now you’ve probably heard about the latest major cyber attack, named Hafnium. According to Microsoft, this is an attack by what appears to be a state-sponsored ...
IRONSCALES product release v35.01 brings the following new functionality to our customers.
It was just about one year ago when offices around the world began shuttering, their occupants migrating from conference rooms and cubicles to home office spaces, dining tables, or whatever spot was ...
A half-century has passed since the first electronic messages were sent via connected ARPANET computers. It was roughly a decade later than we began calling these transmissions “email.” In the ...
In the previous post of this four-part series on the email security ecosystem, we highlighted both legacy and trending phishing techniques, such as business email compromise (BEC), spoofing, ...
In the first blog post in this four part series, we explored the ten most common email phishing tactics and what makes each of them unique and challenging threats. For part two, we explore both ...
As the email phishing threat landscape continues to rapidly evolve, understanding the totality of the email security and anti-phishing universe can be difficult for even the savviest of enterprise ...
In July 2020, threat actors preyed on pandemic-driven financial distress by launching a series of stimulus-related phishing attacks. As talks continue in DC to expand the stimulus, IRONSCALES ...
As we say a not so fond farewell to 2020, it’s a good time to take a reflective look on what this past year brought to the world of email security. Verizon told us last May that 70% of all phishing ...
In part two of this blog series, we explored the interdependencies of SPF, DKIM and DMARC; the limitations and vulnerabilities of each and addressed some of the unintended consequences of DMARC ...
IRONSCALES needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.