Resources

Video

What is Consumer Phishing?

Transcript So, consumer phishing is the process of a cybercriminal sending an email to a consumer that is impersonating a large brand. Agari was one of the co-authors of an internet protocol called DMARC, which implements email authentication to stop phishing on a brand by brand, actually a domain by domain basis. So, the way it works is that you publish a list of who's authorized to send email on...
On-Demand Webinar

Silent Starling and the Emergence of VEC

Silent Starling is a newly discovered cybercriminal group comprised of Nigerian cybercriminals, intent on scamming as much as they can from their victims through a new attack type named vendor email compromise (VEC). Watch this webinar to learn: What VEC is and how it differs from other major attacks Why VEC is the largest threat for your supply chain Which of your employees are most likely to be...
Video

Scattered Canary: The Evolution of Cybercriminal Startup to BEC Enterprise

Business email compromise (BEC) has continued to grow into a billion-dollar industry as cybercriminals turn to it as their preferred scam. But with the West African gang we’ve named Scattered Canary, we have deeper insight into how BEC is connected to the rest of cybercrime, and why it has grown in recent years. View this recorded webinar to learn: How Scattered Canary grew from a one-man startup...
Video

Using Agari in Messaging Operations

Transcript The number one email-based challenge that businesses face today is stopping the advanced identity-based attack. This is the attack where the bad guy impersonates one of your high-value employees and then uses that impersonated email to either get money out of the company via a wire transfer, or to get credentials and get into the company systems to perform a data breach or something...
Video

Combating Surging Email-Based Attacks Through DMARC

Email-based cyber-attacks are surging amid the shift to remote working, and are a major security headache for businesses. Indeed, it is now the most common attack vector used by cyber-criminals to infiltrate networks; for example, to infect businesses with ransomware. In this landscape, organizations must update their email security practices, leveraging the most up-to-date tools and processes...
On-Demand Webinar

Cosmic Lynx Threat Disorder: The Rise of Russian BEC

In this webinar, Agari Sr. Director of Threat Research, Crane Hassold discusses Cosmic Lynx, the first-ever reported Russian BEC criminal organization, and how the group has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.
Video

Shining a Light on BEC Risk and Fraud: How Active Engagement Closes the BEC Intelligence Gap

Business Email Compromise (BEC) costs organizations like yours $9 billion every year. These hard-to-detect phishing schemes drive more than 40% of all cybercrime losses. But threat intelligence and fraud prevention teams have had little visibility into the scope of their risk, the BEC attack cycle, or threat actors’ objectives and methods. That’s about to change. Agari Active Defense leverages an...
Video

Agari DMARC Protection Explainer

Transcript Email remains the most popular method for businesscommunications. It's also the number one target for cyber attacks. And one malicious email is all it takes to destroy years ofbuilding a trusted relationship with your custom versuswhich is why DMARC is an essential email securitysolution that prevents cyber attacks from hijacking yourdomains for email spoofing, executive impersonation...
Video

How and Why COVID-19 is Being Used for BEC and Phishing Attacks

Phishing and Business Email Compromise (BEC) attacks always take advantage of natural disasters and personal misfortune to target even the most vulnerable among us. This time is no different as we are all experiencing the COVID-19 outbreak, but the tactics can be spotted and defeated. In this webinar Crane Hassold, Agari's former Senior Director of Threat Research, provides an inside look into the...
Video

Using Agari in Marketing

Transcript Email security is often overlooked when thinking about brand protection, but it's actually very pivotal. On one hand, I want to make sure as a CMO that I am disallowing anyone from co-opting my brand to spoof consumers or customers. That's very important to me. On the other hand, I want to make sure that my email, my legitimate message that I'm sharing with end customers and consumers...
Video

Chevron Federal Credit Union

"On the outbound side, our biggest asset is our brand. Being able to have that confidence that our customer base is invaluable to us." - Sachin Kundra, Vice President of Information Security
Video

Farm Bureau Bank

"Since email security is so important, we work very hard to ensure the transport of email is done efficiently as we as securely." - Howard Gordon, Vice President and Information Security Officer
Datasheet

Stop Identity-Based Email Attacks

Understanding The Threats Today’s modern identity-based email attacks exploit the identity of trusted colleagues and brands. However, each varies in the tactics and techniques used. Understanding the differences will be critical in being able to effectively and accurately stop these attacks. Customer Phishing : Cybercriminals use brand impersonation techniques such as domain spoofing and malicious...
Datasheet

Inbound DMARC Visibility

If your enterprise email infrastructure isn't reporting DMARC data back to the sender, you are leaving a glaring hole in your visibility into B2B email delivery – even when sent to employee mailboxes from your own domain .