Resources

Blog

The “i'’s” Have It: How BEC Scammers Validate New Targets with Blank Emails

Have you ever received a blank email from someone you don’t know? If you have, it may have been from a cybercriminal making sure your email account is legitimate prior to a Business Email Compromise (BEC) attack. Agari and PhishLabs define BEC as any response-based spear phishing attack involving the impersonation of a trusted party to trick victims into making an unauthorized financial...
On-Demand Webinar

Simplifying DMARC Email Authentication with Agari DMARC Protection

In this webinar, discover how Agari DMARC Protection automates and simplifies DMARC email authentication so you can get to policy=reject faster. You will gain valuable insights, such as: The challenge and limits of DMARC. The benefits of hosted DMARC, BIMI, SPF, and DKIM records. How automated discovery helps quickly identify email senders. Ways to quickly investigate unknown senders. Tips for...
Video

Protecting Remote Employees from Phishing and BEC Attacks

Email is even more crucial as a collaboration tool while we are all working from home and taking other precautions to stay safe and healthy. Hackers, cybercriminals, and other bad actors are exploiting the COVID-19 pandemic for their own personal gain, and it’s your job to ensure your workforce is protected from harm. How do you enable the productivity of your now remote workforce, while...
On-Demand Webinar

Next-Level DMARC

Achieving strong DMARC enforcement is a major milestone for protecting your business, customers, and partners from email attacks that spoof your domain and hijack your brand. But “p=reject” is not the end of the road — it’s just one step towards capturing maximum, ongoing business value of your DMARC program. In this webinar, you’ll discover how to leverage your DMARC investment to deliver...
Video

Forrester Webinar: Risk of Third-Party Impersonation & BEC Scams

Ever since the first spam email message, we have been at war with cyber criminals, who seek to subvert our email communications. We are experiencing an online arms race: As anti-spam solutions improve, criminals find ways around these defenses. Business Email Compromise (BEC) is an area where the criminals have the upper hand against traditional Secure Email Gateways (SEGs). According to Agari’s...
Video

Anatomy of a Compromised Email Account

Using active defense techniques, Agari planted credentials into more than 8,000 phishing sites impersonating enterprise applications, then monitored these accounts to see when and how each compromised account was accessed. Through our analysis, we gained unique insights into what cybercriminals do with compromised email accounts. Watch this webinar to hear answers to important questions about the...
Video

What is Business Email Compromise?

Transcript I recently read a press release from the Federal Bureau of Investigation that reported more than $12 billion in financial fraud losses from a vector they call business email compromise. Here at Agari, we think of business email compromise as any attack which claims to be someone you know and trust, and is attempting some kind of theft. The most classic example is a criminal figures out...
Video

What is Account Takeover?

Transcript Account takeover is a type of attack technique where a cybercriminal will initially compromise an email account, and then use that legitimate email account to launch subsequent attacks such as business email compromise, and spear phishing. Agari stops email account takeover by scrutinizing the sender of the email sent to the recipient. They'll leverage insights from over two trillion...
On-Demand Webinar

Silent Starling and the Emergence of VEC

Silent Starling is a newly discovered cybercriminal group comprised of Nigerian cybercriminals, intent on scamming as much as they can from their victims through a new attack type named vendor email compromise (VEC). Watch this webinar to learn: What VEC is and how it differs from other major attacks Why VEC is the largest threat for your supply chain Which of your employees are most likely to be...
Video

Using Agari in Messaging Operations

Transcript The number one email-based challenge that businesses face today is stopping the advanced identity-based attack. This is the attack where the bad guy impersonates one of your high-value employees and then uses that impersonated email to either get money out of the company via a wire transfer, or to get credentials and get into the company systems to perform a data breach or something...