Resources

Video

Anatomy of a Compromised Email Account

Using active defense techniques, Agari planted credentials into more than 8,000 phishing sites impersonating enterprise applications, then monitored these accounts to see when and how each compromised account was accessed. Through our analysis, we gained unique insights into what cybercriminals do with compromised email accounts. Watch this webinar to hear answers to important questions about the...
On-Demand Webinar

Silent Starling and the Emergence of VEC

Silent Starling is a newly discovered cybercriminal group comprised of Nigerian cybercriminals, intent on scamming as much as they can from their victims through a new attack type named vendor email compromise (VEC). Watch this webinar to learn: What VEC is and how it differs from other major attacks Why VEC is the largest threat for your supply chain Which of your employees are most likely to be...
Video

Agari Identity Graph

Transcript The Agari Identity Graph is the AI-powering Agari Suite of advanced email security solutions, protecting your inbox from costly and damaging phishing schemes, account takeovers, and business email compromise attacks. The Graph leverages machine learning and makes over 300 million model updates each day, analyzing tens of billions of emails flowing through the Secure Email Cloud. The...