Resources | Agari

Resources

Blog

Financials & Card Data Top Q3 Targets on the Dark Web

In Q3, credit unions nearly overtook national banks as the top targeted industry on the Dark Web, according to recent data from Fortra’s PhishLabs.
Blog

Emails Reported as Malicious Reach Four-Quarter High in Q3

The volume of malicious emails reported in corporate inboxes has reached a four-quarter high, according to the latest data from Fortra's PhishLabs.
Blog

What is Whaling Phishing & How Does it Work?

“Whaling” phishing fraud attacks target the C-suite of a company which creates high risk of extremely sensitive, mission-critical data being stolen and exposed. Fortunately, protecting the organization from these attacks is possible. Whaling phishing is a type of phishing attack targeting larger, high-value targets, which is why it's called "Whaling." Attackers themselves often pretend to be C...
Blog

What Is Email Spoofing & How Do You Protect Against It?

What is Email Spoofing? Email spoofing is one of the most common forms of cybercriminal activity, specifically a form of identity deception that's widely used in phishing and spam attacks. It underpins the mechanism required to conduct hacking activities, and it can take many forms. Unfortunately, most email users will eventually receive an email that has been spoofed—whether they know it or not...
Blog

The “i'’s” Have It: How BEC Scammers Validate New Targets with Blank Emails

Have you ever received a blank email from someone you don’t know? If you have, it may have been from a cybercriminal making sure your email account is legitimate prior to a Business Email Compromise (BEC) attack. Agari and PhishLabs define BEC as any response-based spear phishing attack involving the impersonation of a trusted party to trick victims into making an unauthorized financial...
Video

Protecting Remote Employees from Phishing and BEC Attacks

Email is even more crucial as a collaboration tool while we are all working from home and taking other precautions to stay safe and healthy. Hackers, cybercriminals, and other bad actors are exploiting the COVID-19 pandemic for their own personal gain, and it’s your job to ensure your workforce is protected from harm. How do you enable the productivity of your now remote workforce, while...
Video

Forrester Webinar: Risk of Third-Party Impersonation & BEC Scams

Ever since the first spam email message, we have been at war with cyber criminals, who seek to subvert our email communications. We are experiencing an online arms race: As anti-spam solutions improve, criminals find ways around these defenses. Business Email Compromise (BEC) is an area where the criminals have the upper hand against traditional Secure Email Gateways (SEGs). According to Agari’s...
Video

Understanding the Specific BEC and Phishing Attacks Targeting Your Organization

In this webinar, enterprise email security expert Brent Sleeper shares a quick demonstration of the Agari Active Defense BEC Threat Intelligence service. Learn how security teams gain actionable intelligence by engaging threat actors behind the BEC and phishing attacks targeting your organization. You’ll gain valuable insights, such as: The power of understanding the full attack cycle in...
Video

Protect Employees Against BEC Attacks with Agari Phishing Defense™

In this webinar, enterprise email and security expert Art Chavez demonstrates how Agari Phishing Defense™ protects employees against phishing and Business Email Compromise (BEC) attacks that easily bypass existing security controls such as secure email gateways, URL rewriting processes, and impostor classifiers. You’ll discover valuable insights, and learn how to: Keep your employees safe by...
Video

What is Business Email Compromise?

Transcript I recently read a press release from the Federal Bureau of Investigation that reported more than $12 billion in financial fraud losses from a vector they call business email compromise. Here at Agari, we think of business email compromise as any attack which claims to be someone you know and trust, and is attempting some kind of theft. The most classic example is a criminal figures out...
Video

What is Account Takeover?

Transcript Account takeover is a type of attack technique where a cybercriminal will initially compromise an email account, and then use that legitimate email account to launch subsequent attacks such as business email compromise, and spear phishing. Agari stops email account takeover by scrutinizing the sender of the email sent to the recipient. They'll leverage insights from over two trillion...
Video

Agari Spring '21 Release Webinar - Brand Protection

At Trust 2021, we revealed the new product features and capabilities included in the Agari Spring ‘21 release. Watch this customer focused on-demand webinar to catch up on exciting new features. This webinar includes information specific to Agari Brand Protection, including access to exclusive data that provides visibility into B2B DMARC email authentication and potential abuse of your branded...
Video

Agari Spring '21 Release Webinar

At Trust 2021, we revealed the new product features and capabilities included in the Agari Spring ‘21 release. This product release simplifies and improves Agari’s Microsoft 365 integration and delivers new visibility into B2B email authentication and potential domain abuse. Watch this customer focused on-demand webinar to catch up on exciting new features, including: Agari Phishing Defense...
Video

Agari Spring '21 Release Webinar - Phishing Defense

At Trust 2021, we revealed the new product features and capabilities included in the Agari Spring ‘21 release. Watch this customer focused on-demand webinar to catch up on exciting new features. This webinar includes information specific to Agari Phishing Defense, including support for Microsoft Graph API-based enforcement, which enables faster remediation of malicious emails while meeting your...
Video

An Insider's View of the $26 Billion BEC Epidemic

In this webinar, hear from Agari Cyber Intelligence Division threat analyst, Ronnie Tokazowski, for an entertaining and informative look into the techniques and threats posed by email scams. As a certified ethical hacker, Ronnie shares his unique perspective and insights about how scammers are targeting your employees, including: The core techniques behind BEC, payroll diversion schemes, check...
On-Demand Webinar

The Geography of BEC

This webinar will cover key findings from analyzing nearly 10,000 active engagements with BEC threat actors to capture the scope of BEC’s global footprint and trends.