• Why IRONSCALES
  • Platform
    Spring '24 Software Release! Check out our new deep image-based detection, GWS capabilities, and more. Explore the new additions
  • Solutions
  • Learn
    New Report! Osterman Research releases their 2024 findings on Image-based/QR Code Attacks. Read the report
  • Partner
  • Pricing

IRONSCALES Blog

Eyal Benishti
by Eyal Benishti
on October 20, 2023

In an ever-evolving digital landscape, cybersecurity threats are not just a buzzword; they are a harsh reality that organizations face daily. While new technology promises to shield us from cyber ...

Or Malzman
by Or Malzman
on October 09, 2023

It’s no secret that cybercriminals leverage current events and holidays to mask their phishing attempts, create urgency, and improve their chances of a successful attack. While many security and IT ...

by Jenna Knoblauch
on September 28, 2023

Emerging threats created by generative AI evade traditional defenses, BEC attacks with differentiated file types and sender names are on the rise.

by Andrew Roehm
on September 14, 2023

In recent times, the world of cybersecurity has been forced to confront a new and unsettling reality: the emergence of malicious Generative AI, often embodied by ominous names like FraudGPT and ...

by Andrew Roehm
on September 01, 2023

In our hyper- connected world, data mishaps are the new normal. Data breaches, data leaks, and data loss have become major concerns for organizations of all sizes. These incidents not only pose ...

by Jenna Knoblauch
on August 31, 2023

IRONSCALES, the leading enterprise cloud email security platform combining AI and human insights to protect more than 10,000 global organizations, is thrilled to announce the appointment of Matthew ...

Audian Paxson
by Audian Paxson
on August 29, 2023

In my two decades of working in product management and marketing for various cybersecurity technologies, I've had the privilege of engaging with hundreds of real-world practitioners. These ...

by Jenna Knoblauch
on August 24, 2023

In the ever-evolving world of cyber threats, threat actors are constantly finding new ways to exploit vulnerabilities and trick individuals and organizations into divulging sensitive information. One ...

Eyal Benishti
by Eyal Benishti
on August 23, 2023

Business email compromise (BEC) is one of the most costly and damaging types of email threats, as it relies on social engineering, deception and impersonation to defraud the recipient. According to ...

Henrik Davidsson
by Henrik Davidsson
on August 18, 2023

Consider this scenario An attacker sends a phishing email to lure an end user within an organization into clicking a malicious link, opening an attachment, or providing login credentials. Once the ...

Shapes-Left

Subscribe to our blog:

IRONSCALES needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right