Resources

Video

Anatomy of a Compromised Email Account

Using active defense techniques, Agari planted credentials into more than 8,000 phishing sites impersonating enterprise applications, then monitored these accounts to see when and how each compromised account was accessed. Through our analysis, we gained unique insights into what cybercriminals do with compromised email accounts. Watch this webinar to hear answers to important questions about the...
On-Demand Webinar

Silent Starling and the Emergence of VEC

Silent Starling is a newly discovered cybercriminal group comprised of Nigerian cybercriminals, intent on scamming as much as they can from their victims through a new attack type named vendor email compromise (VEC). Watch this webinar to learn: What VEC is and how it differs from other major attacks Why VEC is the largest threat for your supply chain Which of your employees are most likely to be...
Video

Using Agari in Messaging Operations

Transcript The number one email-based challenge that businesses face today is stopping the advanced identity-based attack. This is the attack where the bad guy impersonates one of your high-value employees and then uses that impersonated email to either get money out of the company via a wire transfer, or to get credentials and get into the company systems to perform a data breach or something...
On-Demand Webinar

Cosmic Lynx Threat Disorder: The Rise of Russian BEC

In this webinar, Agari Sr. Director of Threat Research, Crane Hassold discusses Cosmic Lynx, the first-ever reported Russian BEC criminal organization, and how the group has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.
Video

Agari DMARC Protection Explainer

Transcript Email remains the most popular method for businesscommunications. It's also the number one target for cyber attacks. And one malicious email is all it takes to destroy years ofbuilding a trusted relationship with your custom versuswhich is why DMARC is an essential email securitysolution that prevents cyber attacks from hijacking yourdomains for email spoofing, executive impersonation...
Video

How and Why COVID-19 is Being Used for BEC and Phishing Attacks

Phishing and Business Email Compromise (BEC) attacks always take advantage of natural disasters and personal misfortune to target even the most vulnerable among us. This time is no different as we are all experiencing the COVID-19 outbreak, but the tactics can be spotted and defeated. In this webinar Crane Hassold, Agari's former Senior Director of Threat Research, provides an inside look into the...
Video

Using Agari in Marketing

Transcript Email security is often overlooked when thinking about brand protection, but it's actually very pivotal. On one hand, I want to make sure as a CMO that I am disallowing anyone from co-opting my brand to spoof consumers or customers. That's very important to me. On the other hand, I want to make sure that my email, my legitimate message that I'm sharing with end customers and consumers...
Video

Farm Bureau Bank

"Since email security is so important, we work very hard to ensure the transport of email is done efficiently as we as securely." - Howard Gordon, Vice President and Information Security Officer
Guide

Scarlet Widow Part 1: Breaking Hearts for Profit

Table of Contents Who is Scarlet Widow? Femmes Fictionale and Counterfeit Romeos The Long Con: Making Moves for Money Starry Eyes for Starling Michael Up Close and Personal: The Case of "Robert Blackwell"
Datasheet

Stop Identity-Based Email Attacks

Understanding The Threats Today’s modern identity-based email attacks exploit the identity of trusted colleagues and brands. However, each varies in the tactics and techniques used. Understanding the differences will be critical in being able to effectively and accurately stop these attacks. Customer Phishing : Cybercriminals use brand impersonation techniques such as domain spoofing and malicious...
Datasheet

Fortra's Customer Phishing Protection Bundle Datasheet

Prevent, Detect & Disrupt Phishing with an Integrated Solution from Agari & PhishLabs Threat actors impersonate legitimate brands to steal account holder credentials, leading to increased fraud and loss of customer trust. As phishing continues to rise, many organizations find themselves in need of more proactive protection that can deliver the email authentication, threat intelligence, and...