Blog
2022 Data Privacy Week – Education and Inspiration
Mon, 01/24/2022
As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today.Led by the National Cyber...
Blog
Six Steps to Email Security Best Practice
Thu, 01/13/2022
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Blog
What Is Email Phishing? Protect Your Enterprise
Wed, 12/08/2021
Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult.
What Is Email Phishing?
Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog
It’s the Most Wonderful Time of the Year… for Cybercriminals
Mon, 11/29/2021
The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Blog
TLS Email Encryption: What It Is & How to Check if Your Email Is Using It
Mon, 06/21/2021
What exactly is TLS when it comes to email encryption?
TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called Secure Sockets Layer, or SSL...
Blog
Email Security: Agari Delivers a Whole New Level of Actionable Insight to Outpace Threat Actors
Sun, 01/24/2021
CISOs and their teams are about to get some serious performance enhancers in their high-stakes race against email security threats.
According to the FBI, phishing campaigns, business email compromise (BEC) scams, and other advanced email attacks have resulted in $26 billion in business losses over the course of three years. Then 2020 happened.
With 75 million corporate employees even now still...
Blog
What is Email Spoofing & How to Stop Attackers from Spoofing Your Email Address
Tue, 12/15/2020
What is email spoofing, how does it work, and why is it so dangerous to your company? We’ll explain everything you need to proactively stop attackers from spoofing your email address.
Email Spoofing: What Is It?
Email spoofing is when a fraudster forges an email header’s ‘From’ address to make it appear as if it was sent by someone else, usually a known contact like a high-level executive or...
Blog
BEC Cash-out Methods: Email Fraudsters Experimenting With Alternative Approaches
Tue, 12/01/2020
Business email compromise (BEC) actors are exploring alternative cash-out methods for spiriting away the profits from their crimes.
Traditional bank accounts have long been the go-to choice for email scammers seeking to cash out the funds they've pilfered from organizations they victimize. Just since 2016, BEC groups have defrauded businesses out of more than $26 billion worldwide. But over the...
Blog
BEC Attacks: What They Are, How to Spot Them, and What to Do
Tue, 11/10/2020
Here we’ll cover what BEC attacks are, how they work, what they usually look like, and how to handle them.
What is a BEC Attack?
7 Common BEC Attack Patterns
Top Identity Deception Techniques
How Can BEC Attacks be Stopped?
What's the Best Way to Recover From a BEC Attack?
What is a BEC Attack?
First, let me explain what a BEC attack is. In short, Business Email Compromise phishing occurs...
Blog
Agari Fall ' 20 Release Boosts CISO Confidence in Enterprise DMARC Deployment
Tue, 09/29/2020
With cyber gangs leveraging business email compromise (BEC) attacks that actively exploit their targets' level of DMARC adoption, CISOs have been ratcheting up email security.
Until now, the need to dial up defenses against imposters posing as senior executives in email attacks has been increasingly forcing legitimate business correspondence into quarantine. The chain reaction kneecaps commerce,...
Blog
Phishing: How to Protect Against Email Attacks Sent from Compromised SendGrid Accounts
Mon, 09/28/2020
Blocking SendGrid email traffic isn't a realistic option for most businesses hit by a barrage of phishing attacks emanating from compromised accounts at the Twilio-owned email service provider in recent months.
Instead, Agari leverages a strategic data modeling approach to neutralize the threat while enabling legitimate SendGrid-distributed emails to safely reach employee inboxes. More on that in...
Blog
Brand Indicators for Message Identification (BIMI) Adoption Soaring to New Heights
Wed, 09/23/2020
For a growing number of email marketers, it may be "BIMI or bust." As of June 30, nearly 5,300 companies have adopted Brand Indicators for Message Identification (BIMI), a new email standard for showcasing a brand's logo next to its email messages in recipient inboxes, with built-in protections against phishing-based brand spoofing.
The tally reflects a 3.8X increase in the number of brands...
Blog
Why Full DMARC Protection is a Pressing Business Imperative in 2020 and Beyond
Tue, 09/15/2020
If you haven't deployed Domain-based Messaging Authentication, Reporting, and Conformance (DMARC) to protect your brand from being impersonated in phishing scams, there are pressing reasons to jump on it now.
Without a doubt, these are extraordinary times for individuals and organizations alike as we've been forced to change the way we work, shop, play, and live seemingly overnight, and for far...
Blog
DMARC: How Phishing Rings Can Use Your Email Authentication Controls Against You
Thu, 07/23/2020
In the first reported case of its kind, a phishing ring in Eastern Europe is exploiting companies' own Domain-based Message Authentication, Reporting and Conformance (DMARC) controls to impersonate CEOs in business email compromise (BEC) scams worth millions.As detailed in our new threat actor dossier on a group we call Cosmic Lynx, the Agari Cyber Intelligence Division (ACID) has identified the...
Blog
Business Email Compromise: New Shift in BEC Threat Landscape Puts CISOs on Notice
Fri, 07/17/2020
A seismic shift in the email threat landscape has CISOs bracing for sophisticated new forms of business email compromise (BEC) scams, as phishing's center of gravity begins to tilt from West African email scammers toward Russian and Eastern European cybercrime lords.
As detailed in our new threat actor dossier on a threat group we call Cosmic Lynx, the Agari Cyber Intelligence Division (ACID) has...
Blog
Agari Summer '20 Release: CISOs Gain Unique Threat Intel to Their Organizations
Tue, 06/30/2020
With business email compromise (BEC) scams up sharply amid the coronavirus pandemic, CISOs have been forced to scour an expanding but largely inscrutable email threat landscape in hopes of fending off costly attacks—until now, that is.
In an industry first, the new Agari Summer '20 Release offers CISOs access to real-world intelligence on specific phishing threats unique to their organizations....
Blog
Forrester: Agari Phishing Defense Works a 97% ROI Over Three Years
Mon, 06/22/2020
A new Total Economic Impact (TEI) Study from Forrester finds that Agari Phishing Defense™ (APD) delivered results 36% faster than competing solutions, and results in a 97% ROI in just three years.But it turns out that's just the warm-up act.TEI reports are designed to help organizations accurately evaluate potential IT initiatives. In this instance, we commissioned the study so Forrester analysts...
Blog
COVID-19 Credential Phishing Scams: Feeding Off Coronavirus Fears
Tue, 04/28/2020
Since the beginning of February, we have seen more than a 3,000% increase in Coronavirus-themed phishing attacks targeting our customers. The spike in attacks is as logical as it is repugnant. With an estimated 75 million employees more reliant than ever on email during the largest "work-from-home experiment" in history, phishing scammers and other threat actors seem hellbent on exploiting...
Blog
DMARC and Lookalike Domains: How to Protect Your Customers from Getting Duped
Fri, 02/07/2020
Hint: DMARC Alone Won't Cut It
Think the prospect of cybercriminals using your domains to launch phishing attacks sounds bad for your brand? Just wait until you hear the latest on lookalike domains.
Over the last few months, researchers have been discovering a troubling number of phishing sites that feature domains meant to impersonate leading brands in a variety of industries.
Sometimes referred...