Resources

Blog

Office 365 Phishing Emails: Prevention, Detection, Response

Office 365 phishing emails come in common patterns. I'll list them here and also cover Office 365 anti-phishing features for prevention, detection, and response. Today, the typical Office 365 phishing emails direct users to fake Office 365 Sign-in pages. The victim submits their credentials, effectively handing over their password. Fraudsters use that login to access the...
Press Release

Agari honored with Best Overall Enterprise Email Security Solution of the Year Award

FOSTER CITY, CA (Nov. 18, 2020) -- Agari, the market share leader in phishing defense solutions for the enterprise, announced today that its email authentication product, Agari Brand Protection™, won Overall Enterprise Email Security Solution of the Year at the 2020 Cybersecurity Breakthrough Awards. Now in its fourth year the Cybersecurity Breakthrough Awards are considered...
Blog

DKIM for Email: What It Is, How It Works, and How to Add It

We'll cover what DKIM for email is, why your company needs it, how it works, how to set DKIM up, and additional ways to prevent email spoofing attacks. What is DKIM? First, let’s clarify what DKIM is in email. DomainKeys Identified Mail is a technique that uses your domain name to sign your emails with a digital “signature” so your customers know it’s really you sending those...
Blog

DMARC: 5 Keys to Success

In this post, we will look at 5 keys to DMARC success both organizationally and in enterprise-wide implementation. Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a standard email authentication protocol that plays an essential role in any organization’s cyber security arsenal. That’s because DMARC is key to protecting your business, customers, and...
Blog

BEC Attacks: What They Are, How to Spot Them, and What to Do

Here we’ll cover what BEC attacks are, how they work, what they usually look like, and how to handle them. What is a BEC Attack? 7 Common BEC Attack Patterns Top Identity Deception Techniques How Can BEC Attacks be Stopped? What's the Best Way to Recover From a BEC Attack? What is a BEC Attack? First, let me explain what a BEC attack is. In short, Business Email...
Blog

BEC Scams: What to Look For, What to Do

We'll cover what BEC scams (Business Email Compromise scams) are, how they work, what you should look for, and what to do about them, including: What the Heck is BEC? 3 Reasons BEC Attacks Are Getting Worse What Are The Top BEC Scams to Look Out For? Key Identity Deception Tactics You Need to Know How Can BEC Scams Be Blocked?     What the Heck is BEC?   Here’s how...
Press Release

Agari Dispels Myth of Where Phishing Criminals are Located

FOSTER CITY, Calif. and LONDON (Oct. 13, 2020) -- Agari, the market share leader in phishing defense for the enterprise, unveiled today the results of a year-long investigation into geographic locations of business email compromise (BEC) cybercriminals. Today’s announcement pinpoints for the first time where email scammers are located globally and maps their tangled web of...
Blog

The Global Reach of Business Email Compromise (BEC)

Over the last five years, Business Email Compromise (BEC) has evolved into the predominant cyber threat businesses face today. Since 2016, businesses have lost at least $26 billion as a result of BEC scams and, based on the most recent FBI IC3 report, losses from BEC attacks grew another 37 percent in 2019—accounting for 40 percent of all cybercrime losses over the course of...
Blog

DMARC Setup Guide: How to Add DMARC Step by Step

We'll explain how to configure DMARC for your company's email, including what you'll need and how to add DMARC to your DNS. Just follow these DMARC setup steps! Before we begin, here’s a high-level overview of how to add DMARC to your DNS. Add your DMARC record into your DNS Select the TXT record type Add the host value (see details below) Add the value information (see...
Blog

Agari Fall ' 20 Release Boosts CISO Confidence in Enterprise DMARC Deployment

With cyber gangs leveraging business email compromise (BEC) attacks that actively exploit their targets' level of DMARC adoption, CISOs have been ratcheting up email security. Until now, the need to dial up defenses against imposters posing as senior executives in email attacks has been increasingly forcing legitimate business correspondence into quarantine. The chain reaction...
Blog

Phishing: How to Protect Against Email Attacks Sent from Compromised SendGrid Accounts

Blocking SendGrid email traffic isn't a realistic option for most businesses hit by a barrage of phishing attacks emanating from compromised accounts at the Twilio-owned email service provider in recent months. Instead, Agari leverages a strategic data modeling approach to neutralize the threat while enabling legitimate SendGrid-distributed emails to safely reach employee...
Blog

Brand Indicators for Message Identification (BIMI) Adoption Soaring to New Heights

For a growing number of email marketers, it may be "BIMI or bust." As of June 30, nearly 5,300 companies have adopted Brand Indicators for Message Identification (BIMI), a new email standard for showcasing a brand's logo next to its email messages in recipient inboxes, with built-in protections against phishing-based brand spoofing. The tally reflects a 3.8X increase in the...
Blog

Why Full DMARC Protection is a Pressing Business Imperative in 2020 and Beyond

If you haven't deployed Domain-based Messaging Authentication, Reporting, and Conformance (DMARC) to protect your brand from being impersonated in phishing scams, there are pressing reasons to jump on it now. Without a doubt, these are extraordinary times for individuals and organizations alike as we've been forced to change the way we work, shop, play, and live seemingly...
Press Release

Agari has been honored as the winner of the Best Security Company of the Year at the Annual Cyber Security Awards 2020

LONDON (Sept. 14, 2020) - Agari, the market share leader in phishing defense solutions for the enterprise, have earned the Best Security Company of the Year – over 150 staff award at the Cyber Security Awards for their pioneering contributions to and continued trailblazing within the email security sector. The Cyber Security Awards were established in 2014 to reward the best...
Blog

Implement DMARC for Trust Before Google AMP for Email

With marketers more dependent on digital channels, many may accelerate their tests of Google's AMP for Email technology in search of an edge. But without an email protocol called Domain-based Messaging Authentication, Reporting and Conformance (DMARC), fraudsters could weaponize the trust customers expect from your brand for their own evil intentions and put consumers and...
Blog

Employee-Reported Phishing Attacks Climb 65%, Clobbering SOC Teams

Scams related to COVID-19 helped fuel a 65% increase in employee-reported phishing attacks during the first half of 2020, according to our mid-year Phishing Incident Response Survey of SOC professionals at 13 large organizations spanning a cross-section of industries.Even before the outbreak, phishing was implicated in nearly 7 in 10 corporate data breaches, prompting many...
Blog

DMARC Adoption Slows, 80% of Fortune 500 Email Senders Remain Unauthenticated

The first half of 2020 saw 25 additional Fortune 500 companies adopt Domain-based Messaging, Reporting & Conformance (DMARC)—bringing the total to 20% of organizations within the index, according to our H2 2020 Email Fraud and Identity Deception Trends Video . Which is salutatory, to be sure. But it means 80% of the world's biggest companies haven't adopted the standard email...
Blog

Phishing & BEC Scams Soar 3000%: Agari H2 2020 Email Fraud and Identity Deception Trends Report

Coronavirus-related phishing attacks and business email compromise (BEC) scams skyrocketed 3,000% from mid-March through early June, according to mid-year analysis from the Agari Cyber-Intelligence Division (ACID). As chronicled in our H2 2020 Email Fraud & Identity Deception Trends Report, the year began with expectations of record-breaking profits for email threat groups—long...
Blog

DMARC: How Phishing Rings Can Use Your Email Authentication Controls Against You

In the first reported case of its kind, a phishing ring in Eastern Europe is exploiting companies' own Domain-based Message Authentication, Reporting and Conformance (DMARC) controls to impersonate CEOs in business email compromise (BEC) scams worth millions.As detailed in our new threat actor dossier on a group we call Cosmic Lynx, the Agari Cyber Intelligence Division (ACID)...
Blog

Business Email Compromise: New Shift in BEC Threat Landscape Puts CISOs on Notice

A seismic shift in the email threat landscape has CISOs bracing for sophisticated new forms of business email compromise (BEC) scams, as phishing's center of gravity begins to tilt from West African email scammers toward Russian and Eastern European cybercrime lords. As detailed in our new threat actor dossier on a threat group we call Cosmic Lynx, the Agari Cyber Intelligence...