Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Email Security

Easily Find and Secure Sensitive Data in Gmail with Egnyte

Gmail is an immensely popular service, with nearly 2 billion active accounts. And as the service has grown, businesses have turned to it for all kinds of things it was never meant to do: user authentication, password recovery, and perhaps most problematic, the passing of sensitive or regulated data between parties.

Securing your M365 journey: Stopping the additional 30% of email security risks

The way in which we respond to email security risks needs to change. It’s no longer a case of reinforcing the network perimeter. The risks are now far more complex and nuanced, driven by human behaviour. From every conversation we have, Security and IT leaders tell us that people: These are a combination of both inbound and outbound threats but what they have in common is that they are human-activated risks – there’s a person behind each of them.

Lookout Researchers Take Down Phishing Scams Targeting U.S. Military Families

Here at Lookout, our Threat Intelligence Services teams work with a massive data set that enables them to proactively hunt for threats and conduct forensic investigations. While our findings are used to protect Lookout customers, we also pride ourselves in contributing to the cybersecurity community ensuring that everyone’s security and privacy are safeguarded.

Phishing operators abuse bank APIs to improve phishing TTPs

True Login phishing kits are continuously being developed by threat actors to improve their TTPs in luring victims. By using true login kits, the phishing operators have a higher chance of making potential victims believe they are logging into the real website. True login kit developers are abusing publicly available APIs of the banking company to be able to query login information to be shown to potential victims, in turn luring the victim even further into the operations.

Holiday phishing season: Your guide to staying scam-safe

For many of us, the Thanksgiving and Christmas period is a chance for some well-deserved downtime. For cybercriminals, not so much. The holiday season is one of the most productive time of the year for the Phishing-as-a-Service (PhaaS) industry. Online retail sales spike around holidays, creating more opportunities to catch people out with phishing emails and spoofed websites.

Rising volume of email fatigue opens doors for Cybercriminals

While remote work has many benefits, it can increase the risk of employees suffering from directed attention fatigue (DAF), where they find themselves unable to focus due to constant distractions. This is due primarily to isolation and the constant bombardment of emails and instant messages. In fact, one of the most worrying types of DAF for security professionals is email fatigue.

The Network Effect and the Search for Resilient Email Security

'Email is dead. It's a thing of the past.' In the IT industry, this statement, or something like it, is said regularly — usually corresponding with the rise of a new communication or collaboration platform. Each time this happens, it's prudent to remember a general rule around tools: as long as they retain specific advantages for the human beings using them, they generally endure.