Eyal Benishti

More from Eyal Benishti

By Eyal Benishti
on March 11, 2021
In this email security blog series, we’ve examined the most common phishing tactics (Part 3), the techniques most commonly leveraged by threat actors (Part 2), and the many puzzle pieces found in ...
By Eyal Benishti
on March 09, 2021
So what exactly is going on? By now you’ve probably heard about the latest major cyber attack, named Hafnium. According to Microsoft, this is an attack by what appears to be a state-sponsored ...
By Eyal Benishti
on March 05, 2021
It was just about one year ago when offices around the world began shuttering, their occupants migrating from conference rooms and cubicles to home office spaces, dining tables, or whatever spot was ...
By Eyal Benishti
on March 05, 2021
A half-century has passed since the first electronic messages were sent via connected ARPANET computers. It was roughly a decade later than we began calling these transmissions “email.” In the ...
By Eyal Benishti
on March 01, 2021
In the previous post of this four-part series on the email security ecosystem, we highlighted both legacy and trending phishing techniques, such as business email compromise (BEC), spoofing, ...
By Eyal Benishti
on February 21, 2021
In the first blog post in this four part series, we explored the ten most common email phishing tactics and what makes each of them unique and challenging threats. For part two, we explore both ...
By Eyal Benishti
on February 15, 2021
As the email phishing threat landscape continues to rapidly evolve, understanding the totality of the email security and anti-phishing universe can be difficult for even the savviest of enterprise ...
By Eyal Benishti
on January 16, 2021
As we say a not so fond farewell to 2020, it’s a good time to take a reflective look on what this past year brought to the world of email security. Verizon told us last May that 70% of all phishing ...
By Eyal Benishti
on January 01, 2021
In part two of this blog series, we explored the interdependencies of SPF, DKIM and DMARC; the limitations and vulnerabilities of each and addressed some of the unintended consequences of DMARC ...
By Eyal Benishti
on December 29, 2020
In our last blog post we discussed the hype around Domain-based Message Authentication, Reporting & Conformance (DMARC), the upcoming deadline for compliance to DHS’ Binding Operational Directive ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right