banner-blog.jpg

BLOG

Phishing Attacks Are Scarily Easy to Build

Posted by James Locus on Sep 22, 2020

Targeting People, Not the Infrastructure

Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.

Read More

Tags: phishing, isolation, email isolation, link isolation, link wrapping

The URL “Danger Zone”

Posted by James Locus on Aug 18, 2020

Inadequate Security Policies with Uncategorized Sites

The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed to sneak into the network as uncategorized sites.

 

Read More

Tags: phishing, email isolation, uncategorized sites, URL, email filtering, danger

Connect with us

Lists by Topic

see all

Recent Posts