By Brendon Roddas
on August 24, 2020
If you follow our blog, then you may have read one of our many articles this year about the growing cyber threat of fake login pages. These nefarious yet often highly realistic looking pages are now ...
By Ian Baxter
on July 22, 2020
A recent report from Gartner showed worldwide IT spending is expected to reach $3.5 trillion this year, a 7.3% drop from 2019 due to COVID-19 – and yet it’s more important than ever for companies to ...
By Eyal Benishti
on January 13, 2020
Phishing websites, also known as spoofed websites, are a very common deception tactic that attackers now rely on to obtain a person’s login credentials to a legitimate website. The operation, ...
By Eyal Benishti
on December 30, 2019
As we approach the end of 2019 and the culmination of a chaotic decade for phishing attacks, it’s time we begin to look forward to the email security industry challenges and opportunities that lie ...
By IRONSCALES
on September 04, 2019
A new phishing campaign highlights the need for modern email security approaches in combating account takeover and credential theft.
By Eyal Benishti
on January 24, 2019
As we’ve written about before, email security originated in the early 2000s with anti-spam filters, followed by innovations in attack signature detection, which subsequently paved the way for secure ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
By Tristan Bishop
on August 15, 2018
In case you missed it, we were recently named to the “Emerging Vendor 2018: Cybersecurity Companies You Should Know” list by CRN. This recognition is not only indictive of the progress we have made ...
By Eyal Benishti
on February 06, 2017
Hackers and cyber criminals have responded to the adoption of employee phishing awareness training, by improving the sophistication and deceptiveness of their attacks.
By Eyal Benishti
on February 23, 2016
In today’s high-stakes corporate environment, you might think that it would be pretty hard to hack a company like yours.
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right