Resources

Blog

What is DMARC? Effects on Email Spoofing & Deliverability

Wondering how DMARC affects email? Here’s a comprehensive guide explaining what DMARC is, how it affects email, and why your company needs it for security. What is DMARC? What does DMARC mean? DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is an email authentication protocol to help email administrators prevent fraudsters from spoofing email domains by specifying...
Blog

Cosmic Lynx Returns in 2021 with Updated Tricks

In July 2020, we published a report on a Russian-based BEC group we called Cosmic Lynx . In that report , we described the tactics used by the group, which included its targeting of senior executives at large companies with a global footprint and how it uses mergers and acquisitions (M&A) themes in its BEC email lures. Shortly after we published the report, we saw a significant decrease in Cosmic...
Blog

DMARC 101 (Part I) – S/MIME, SPF, and DKIM

Why do you need DMARC to protect your email domains from being leveraged in phishing attacks? To get the full picture, let's look at the basics—and how DMARC came to be. What is DMARC? Domain-based Message Authentication, Reporting & Conformance, or DMARC , is an open email authentication protocol that helps senders protect their email domains from being spoofed by fraudsters in phishing attacks...
Press Release

It's the Most Wonderful Time of the Year for Cybercriminals

‘Tis the season to be extra vigilant for email scams. In this article, Mike Jones from Agari by Fortra looks at ways businesses can protect their employees' inboxes. Originally published in Financial IT.net Excerpt: "In email spoofing attacks , the sender display and domain names can look like they come from legitimate brands. To prevent this, businesses can implement DMARC authentication so that...
Blog

BIMI: What It Is & Why It Matters to Email Security

Curious how BIMI can protect your email? I’ll explain what BIMI is, how it works, and how you can use it to protect your brand’s email communications. What is BIMI? Brand Indicators for Message Identification, or BIMI, provides a standardized method for businesses to showcase their brand logo next to the subject line of their authenticated emails so they stand out in crowded inboxes, with built-in...
Blog

Email Security: Agari Delivers a Whole New Level of Actionable Insight to Outpace Threat Actors

CISOs and their teams are about to get some serious performance enhancers in their high-stakes race against email security threats. According to the FBI, phishing campaigns, business email compromise (BEC) scams, and other advanced email attacks have resulted in $26 billion in business losses over the course of three years. Then 2020 happened. With 75 million corporate employees even now still...
Press Release

Agari Outperforms Fourth Quarter and Full Year 2020 Expectations; Uncovers Cybercriminals Behind COVID-19 Unemployment Fraud; Earns Industry Recognitions for Innovation

FOSTER CITY, CA and LONDON (Jan. 6, 2021) -- Agari, the market share leader in phishing defense solutions for the enterprise, today announced performance results for its fiscal fourth quarter and full year ended December 31, 2020. Highlights include: 33% global customer growth First to identify one of the cybercriminal rings behind U.S. CARES Act Fraud First to uncover Russian “BEC” cybercriminal...
Blog

DMARC: 3 Best Practices for Capturing Next-Level Business Value

Implementing DMARC at its highest enforcement level is critically important to security and messaging operations. But it's also just the first step to realizing the full value of your DMARC program. To understand why, let's start with the basics. DMARC , which stands for Domain-based Message Authentication, Reporting, and Conformance, can stop fraudsters from spoofing your domain and impersonating...
Press Release

Agari honored with Best Overall Enterprise Email Security Solution of the Year Award

FOSTER CITY, CA (Nov. 18, 2020) -- Agari, the market share leader in phishing defense solutions for the enterprise, announced today that its email authentication product, Agari Brand Protection™, won Overall Enterprise Email Security Solution of the Year at the 2020 Cybersecurity Breakthrough Awards . Now in its fourth year the Cybersecurity Breakthrough Awards are considered one of industry’s...
Blog

DKIM for Email: What It Is, How It Works, and How to Add It

We'll cover what DKIM for email is, why your company needs it, how it works, how to set DKIM up, and additional ways to prevent email spoofing attacks. What is DKIM? First, let’s clarify what DKIM is in email. DomainKeys Identified Mail is a technique that uses your domain name to sign your emails with a digital “signature” so your customers know it’s really you sending those emails and that they...
Blog

DMARC: 5 Keys to Success

In this post, we will look at 5 keys to DMARC success both organizationally and in enterprise-wide implementation. Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a standard email authentication protocol that plays an essential role in any organization’s cyber security arsenal. That’s because DMARC is key to protecting your business, customers, and partners from email...
Video

5 Keys to DMARC Success

DMARC email authentication is essential to protecting your business, customers, and partners from email attacks that spoof your domain and hijack your brand. But for large enterprises, effective DMARC deployment is a complex, high-stakes effort. Let Agari show you the way to full DMARC protection quickly and safely. In this webinar, you’ll discover 5 best practices from the pros: Key program...
Blog

The Global Reach of Business Email Compromise (BEC)

Over the last five years, Business Email Compromise (BEC) has evolved into the predominant cyber threat businesses face today. Since 2016, businesses have lost at least $26 billion as a result of BEC scams and, based on the most recent FBI IC3 report , losses from BEC attacks grew another 37 percent in 2019—accounting for 40 percent of all cybercrime losses over the course of the year. The...
Blog

DMARC Setup Guide: How to Add DMARC Step by Step

We'll explain how to configure DMARC for your company's email, including what you'll need and how to add DMARC to your DNS. Just follow these DMARC setup steps! Before we begin, here’s a high-level overview of how to add DMARC to your DNS. Add your DMARC record into your DNS Select the TXT record type Add the host value (see details below) Add the value information (see details below) Save the...
Blog

Agari Fall ' 20 Release Boosts CISO Confidence in Enterprise DMARC Deployment

With cyber gangs leveraging business email compromise (BEC) attacks that actively exploit their targets' level of DMARC adoption, CISOs have been ratcheting up email security. Until now, the need to dial up defenses against imposters posing as senior executives in email attacks has been increasingly forcing legitimate business correspondence into quarantine. The chain reaction kneecaps commerce...
Blog

Brand Indicators for Message Identification (BIMI) Adoption Soaring to New Heights

For a growing number of email marketers, it may be "BIMI or bust." As of June 30, nearly 5,300 companies have adopted Brand Indicators for Message Identification ( BIMI ), a new email standard for showcasing a brand's logo next to its email messages in recipient inboxes, with built-in protections against phishing-based brand spoofing. The tally reflects a 3.8X increase in the number of brands...
Blog

Why Full DMARC Protection is a Pressing Business Imperative in 2020 and Beyond

If you haven't deployed Domain-based Messaging Authentication, Reporting, and Conformance (DMARC) to protect your brand from being impersonated in phishing scams, there are pressing reasons to jump on it now. Without a doubt, these are extraordinary times for individuals and organizations alike as we've been forced to change the way we work, shop, play, and live seemingly overnight, and for far...
Blog

Implement DMARC for Trust Before Google AMP for Email

With marketers more dependent on digital channels, many may accelerate their tests of Google's AMP for Email technology in search of an edge. But without an email protocol called Domain-based Messaging Authentication, Reporting and Conformance ( DMARC ), fraudsters could weaponize the trust customers expect from your brand for their own evil intentions and put consumers and businesses at risk. The...
Blog

DMARC: How Phishing Rings Can Use Your Email Authentication Controls Against You

In the first reported case of its kind, a phishing ring in Eastern Europe is exploiting companies' own Domain-based Message Authentication, Reporting and Conformance ( DMARC ) controls to impersonate CEOs in business email compromise (BEC) scams worth millions. As detailed in our new threat actor dossier on a group we call Cosmic Lynx , the Agari Cyber Intelligence Division (ACID) has identified...
Blog

Business Email Compromise: New Shift in BEC Threat Landscape Puts CISOs on Notice

A seismic shift in the email threat landscape has CISOs bracing for sophisticated new forms of business email compromise (BEC) scams, as phishing's center of gravity begins to tilt from West African email scammers toward Russian and Eastern European cybercrime lords. As detailed in our new threat actor dossier on a threat group we call Cosmic Lynx , the Agari Cyber Intelligence Division (ACID) has...