Press Release
Blunting BEC Capers that Continue to Target and Devastate SMBs and Enterprises
In his guest blog on The Last Watchdog, John Wilson looks at why Business Email Compromise (BEC) attacks are on the rise, how they are orchestrated, and what organizations can do to stop this all-too-common attack vector.
Excerpt:
"BEC is a growing concern, and attackers have taken full advantage of the upheaval the COVID-19 pandemic has caused to ramp up their efforts. These campaigns are hard...
Blog
Top Social Media Threats Targeting the Retail Industry
Fri, 03/04/2022
Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns.
Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog
2022 Data Privacy Week – Education and Inspiration
Mon, 01/24/2022
As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today.Led by the National Cyber...
Blog
Six Steps to Email Security Best Practice
Thu, 01/13/2022
To help IT teams define a robust email security policy and determine what’s required from an email security solution, we’ve put together a new six-step guide.
Blog
Common Phishing Email Attacks | Examples & Descriptions
Thu, 12/16/2021
What does a phishing email look like? We've compiled phishing email examples to help show what a spoofed email looks like to prevent against phishing attacks. Brand deception phishing is the most common example of phishing people will come across. Brand deception phishing occurs when an attacker mimics a trusted company in an email and asks someone for their personal information like credit card...
Blog
What Is Email Phishing? Protect Your Enterprise
Wed, 12/08/2021
Phishing emails can steal sensitive data and cost companies' their reputation. However, protecting a company from these scammers doesn't need to be difficult.
What Is Email Phishing?
Phishing is when an attacker mimics a trusted person or brand in an attempt to steal sensitive information, or gain a foothold inside a company network. While phishing emails are by far the most popular, these...
Blog
It’s the Most Wonderful Time of the Year… for Cybercriminals
Mon, 11/29/2021
The holiday season is upon us, which means it’s also the busiest time of the year for online shopping. There’s Black Friday, Cyber Monday, and gifts to buy for loved ones. Plus, gifts to buy for yourself when the deals are this good! But beware, for cybercriminals ‘tis also the season to scam millions of dollars from unsuspecting people and companies. They’re banking on people being in a rush and...
Press Release
Fortra expands anti-phishing and DLP with latest acquisitions
Commenting on the Digital Guardian acquisition, Kate Bolseth, CEO,, said: “Our global customers look to us to provide them with powerful solutions and services to support all of their cybersecurity needs, and the data protection expertise the Digital Guardian team brings to Fortra is second to none.
Read the full article >
...
Press Release
Phishing Sustain Near- Record Levels Through the First Half of 2021
Agari by Fortra features in APWG's Q2 Phishing Activity Trends Report.
Here are some highlights:
APWG saw 222,127 attacks in June 2021, the third worst month in APWG’s reporting history.
Financial institutions and social media sectors were the most frequently victimized.
Increases in vishing and smishing continue to be observed. Vishing is phishing advertised via voice messages, and smishing...
Press Release
How International Scam Artists Pulled Off an Epic Theft of Covid Benefits
Covid-19 provided ample opportunities for threat actors to exploit weaknesses in online systems. In this article by NBC News, spokespeople from Agari explain how one threat actor group, Scattered Canary, used email to fraudulently claim Covid relief unemployment benefits potentially worth millions of US dollars.
Read the full article here.
Agari’s Cyber Intelligence Division is dedicated to...
Blog
TLS Email Encryption: What It Is & How to Check if Your Email Is Using It
Mon, 06/21/2021
What exactly is TLS when it comes to email encryption?
TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called Secure Sockets Layer, or SSL...
Blog
Inside a Compromised Account: How Cybercriminals Use Credential Phishing to Further BEC Scams
Mon, 06/07/2021
Why would a cybercriminal spend time developing malware when he can simply trick unsuspecting users into handing over their passwords? Why would a threat actor spend her money and resources on ransomware, when she can get that same information through a compromised account? It’s a good question, and exactly what the Agari Cyber Intelligence Division wanted to discover.
In a growing trend known as...
Blog
How to Implement the BIMI-Selector Header for Multiple Brands
Thu, 05/20/2021
Wondering what Brand Indicators for Message Identification actually means? Here, we’ll cover the basics of BIMI, what the BIMI-selector header is, what it does, whether you need it, and how to implement it. But first, do you really need the BIMI-selector header? In most cases, you only need the BIMI-selector header if you want to support multiple logos for multiple brands or subdomains. Otherwise,...
Blog
Cyber Threat Intelligence: How to Stay Ahead of Threats
Tue, 05/18/2021
Generally defined, cyber threat intelligence is information used to better understand possible digital threats that might target your organization. This data will help identify threats in order to prevent security breaches in the future.
Why Cyber Threat Intelligence is Important
Having a system in place that can produce threat intelligence is critical to staying ahead of digital threats, as...
Press Release
Trust 2021 Empowers Cybersecurity Organizations with New Insights and Actions to Stop Phishing
FOSTER CITY, Calif. and LONDON (April 15, 2021) – Interest in the Trust 2021 conference soared in the wake of the newly released FBI IC3 fraud report that stated business email compromise (BEC) and other email-based threats accelerated. An analysis of the reports showed that financially motivated fraud added up to $3.5 billion in losses, equaling 70% of all cybercrime losses in 2020.
CISO...
Blog
Protecting Digital Communications During the Digital Transformation: A Look Back at Trust 2021
Wed, 04/14/2021
While we’re all Zoomed, Webexed and Teamed out after thirteen months of the pandemic, cybercriminals are taking advantage of the situation. They know we’re heavily relying on digital communications and they’re sending fake emails, pretending to be your boss. They’re sending fake invoices, pretending to be your vendor. They’re even sending fake requests for gift cards, on the off-chance that...
Blog
Agari Report: New BEC Scam 7X More Costly Than Average, Bigger Phish Start Angling In
Tue, 03/02/2021
Sophisticated new threat actors, evolving phishing tactics, and a $800,000 business email compromise (BEC) scam in the second half of 2020 all signal big trouble ahead, according to new analysis from the Agari Cyber Intelligence Division (ACID).
As captured in our H1 2021 Email Fraud & Identity Deception Trends Report, successful attacks on Magellan Health, GoDaddy, and the SolarWinds "hack of the...
Blog
Cosmic Lynx Returns in 2021 with Updated Tricks
Thu, 02/11/2021
In July 2020, we published a report on a Russian-based BEC group we called Cosmic Lynx. In that report, we described the tactics used by the group, which included its targeting of senior executives at large companies with a global footprint and how it uses mergers and acquisitions (M&A) themes in its BEC email lures.Shortly after we published the report, we saw a significant decrease in Cosmic...
Press Release
Are Organizations Neglecting Business Email Compromise?
While ransomware is rightly positioned as the most immediate cybersecurity threat, businesses shouldn't underestimate the threat business email compromise (BEC) attacks present to organizations.
In this article, Ciaran Rafferty, Managing Director,, discusses the release of the NCSC’s annual review for 2021 and looks at the implications for email security.
Originally published in Computing...