By Tyler Swinehart
on September 20, 2022
URL Rewriting, a service used to sandbox and defang malicious URLs by sending users to a portal that displays the URL in the sandboxed environment, has many well-known weaknesses and a few that may ...
By Ian Thomas
on June 14, 2022
What is Business Email Compromise? Business email compromise (BEC) is a type of targeted phishing (spear phishing) in which a threat actor either accesses or mimics a genuine business email account ...
By Eyal Benishti
on January 01, 2021
In part two of this blog series, we explored the interdependencies of SPF, DKIM and DMARC; the limitations and vulnerabilities of each and addressed some of the unintended consequences of DMARC ...
By Eyal Benishti
on November 16, 2020
Earlier this year, FireEye reported that 86% of phishing attacks observed in Q2 did not contain malware. Subsequently, the annual Verizon Data Breach and Incident Response (DBIR) report concluded ...
By Eyal Benishti
on May 20, 2019
Did you know that any organization, regardless of its size and the number of in-house security personnel employed, can now automatically prevent, detect and respond to all types of sophisticated ...
on April 02, 2019
April 2, 2019– Atlanta & Tel Aviv - IRONSCALES, the world’s first automated phishing prevention, detection and response platform, today announced the results of new research proving that secure ...

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.