Datasheet
Account Takeover Attack Prevention
Organizations are more likely to be breached today than ever before, as cybercriminals shift tactics once again, using account takeovers (ATOs) to launch targeted email attacks. In fact, a recent Osterman Research survey reported that one in five organizations fell victim to an ATO-based email attack within the past 12 months. Attackers know that trusted email is the most effective way of...
Press Release
Blunting BEC Capers that Continue to Target and Devastate SMBs and Enterprises
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
Excerpt:
"BEC is a growing concern, and attackers have taken full advantage of the upheaval the COVID-19 pandemic has caused to ramp up their efforts. These campaigns are hard...
Press Release
Fortra to Acquire Alert Logic to Enable Customers to Address Cybersecurity Skills Shortage with Hybrid IT Approach
Managed detection and response (MDR) forms new cornerstone of Fortra's cybersecurity portfolio
MINNEAPOLIS March 9, 2022—Fortra announced today it has signed a merger agreement to acquire Alert Logic, a well-known leader in managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to...
Blog
Top Social Media Threats Targeting the Retail Industry
Fri, 03/04/2022
Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns.
Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog
2022 Data Privacy Week – Education and Inspiration
Mon, 01/24/2022
As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today.Led by the National Cyber...
Blog
Six Steps to Email Security Best Practice
Thu, 01/13/2022
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Blog
Common Phishing Email Attacks | Examples & Descriptions
Thu, 12/16/2021
What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog
What Is Email Phishing? Protect Your Enterprise
Wed, 12/08/2021
Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult.
What Is Email Phishing?
Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog
It’s the Most Wonderful Time of the Year… for Cybercriminals
Mon, 11/29/2021
The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Press Release
Fortra expands anti-phishing and DLP with latest acquisitions
Commenting on the Digital Guardian acquisition, Kate Bolseth, CEO,, said: “Our global customers look to us to provide them with powerful solutions and services to support all of their cybersecurity needs, and the data protection expertise the Digital Guardian team brings to Fortra is second to none.
Read the full article >
...
Press Release
25% of Mail Claiming to Be from Federal Agencies is Fraudulent
A full quarter (25%) of email claiming to be from federal agencies is either fraudulent or otherwise unauthenticated, analysis has revealed.
Full article: https://www.infosecurity-magazine.com/news/25-of-mail-claiming-to-be-from/
...
Press Release
Phishing Sustain Near- Record Levels Through the First Half of 2021
Agari by Fortra features in APWG's Q2 Phishing Activity Trends Report.
Here are some highlights:
APWG saw 222,127 attacks in June 2021, the third worst month in APWG’s reporting history.
Financial institutions and social media sectors were the most frequently victimized.
Increases in vishing and smishing continue to be observed. Vishing is phishing advertised via voice messages, and smishing...
Press Release
How International Scam Artists Pulled Off an Epic Theft of Covid Benefits
Covid-19 provided ample opportunities for threat actors to exploit weaknesses in online systems. In this article by NBC News, spokespeople from Agari explain how one threat actor group, Scattered Canary, used email to fraudulently claim Covid relief unemployment benefits potentially worth millions of US dollars.
Read the full article here.
Agari’s Cyber Intelligence Division is dedicated to...
Blog
TLS Email Encryption: What It Is & How to Check if Your Email Is Using It
Mon, 06/21/2021
What exactly is TLS when it comes to email encryption?
TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called Secure Sockets Layer, or SSL...
Blog
Inside a Compromised Account: How Cybercriminals Use Credential Phishing to Further BEC Scams
Mon, 06/07/2021
Why would a cybercriminal spend time developing malware when he can simply trick unsuspecting users into handing over their passwords? Why would a threat actor spend her money and resources on ransomware, when she can get that same information through a compromised account? It’s a good question, and exactly what the Agari Cyber Intelligence Division wanted to discover.
In a growing trend known as...
Blog
How to Implement the BIMI-Selector Header for Multiple Brands
Thu, 05/20/2021
Wondering what Brand Indicators for Message Identification actually means? Here, we’ll cover the basics of BIMI, what the BIMI-selector header is, what it does, whether you need it, and how to implement it. But first, do you really need the BIMI-selector header? In most cases, you only need the BIMI-selector header if you want to support multiple logos for multiple brands or subdomains. Otherwise,...
Blog
Cyber Threat Intelligence: How to Stay Ahead of Threats
Tue, 05/18/2021
Generally defined, cyber threat intelligence is information used to better understand possible digital threats that might target your organization. This data will help identify threats in order to prevent security breaches in the future.
Why Cyber Threat Intelligence is Important
Having a system in place that can produce threat intelligence is critical to staying ahead of digital threats, as...
Press Release
Agari Named Leader in New "Frost Radar: Email Security " Report Based Growth and Innovation
FOSTER CITY, Calif. and LONDON (April 28, 2021) — Agari, the Trusted Email Identity Company™, announced today that Frost & Sullivan has named Agari a leader in the Frost Radar: Email Security report. This ranking is based on having the highest three year compound annual growth rate (CAGR) of 22.2% as well as the company’s vision and strategy focused on identity-centric email security solutions.
...
Press Release
Trust 2021 Empowers Cybersecurity Organizations with New Insights and Actions to Stop Phishing
FOSTER CITY, Calif. and LONDON (April 15, 2021) – Interest in the Trust 2021 conference soared in the wake of the newly released FBI IC3 fraud report that stated business email compromise (BEC) and other email-based threats accelerated. An analysis of the reports showed that financially motivated fraud added up to $3.5 billion in losses, equaling 70% of all cybercrime losses in 2020.
CISO...