Resources

Press Release

Agari Named Leader in New "Frost Radar: Email Security " Report Based Growth and Innovation

FOSTER CITY, Calif. and LONDON (April 28, 2021) — Agari, the Trusted Email Identity Company™, announced today that Frost & Sullivan has named Agari a leader in the Frost Radar: Email Security report. This ranking is based on having the highest three year compound annual growth rate (CAGR) of 22.2% as well as the company’s vision and strategy focused on identity-centric email security solutions...
Press Release

Trust 2021 Empowers Cybersecurity Organizations with New Insights and Actions to Stop Phishing

FOSTER CITY, Calif. and LONDON (April 15, 2021) – Interest in the Trust 2021 conference soared in the wake of the newly released FBI IC3 fraud report that stated business email compromise (BEC) and other email-based threats accelerated. An analysis of the reports showed that financially motivated fraud added up to $3.5 billion in losses, equaling 70% of all cybercrime losses in 2020. CISO...
Blog

Protecting Digital Communications During the Digital Transformation: A Look Back at Trust 2021

While we’re all Zoomed, Webexed and Teamed out after thirteen months of the pandemic, cybercriminals are taking advantage of the situation. They know we’re heavily relying on digital communications and they’re sending fake emails, pretending to be your boss. They’re sending fake invoices, pretending to be your vendor. They’re even sending fake requests for gift cards, on the off-chance that...
Press Release

Agari Named in the 2021 CRN® Partner Program Guide

FOSTER CITY, Calif. and LONDON, (March 29, 2021) – Agari, the Trusted Email Identity Company, is being acknowledged by CRN® , a brand of The Channel Company , in its 2021 Partner Program Guide. This annual guide provides a conclusive list of the most distinguished partner programs from leading technology companies that provide products and services through the IT Channel. Given the importance of...
Press Release

Scammers Target Wall Street in New Capital Call Fraud Schemes, Reveals Investigation by Email Security Firm Agari

Capital call payment scams target on average more than $800,000 in wire transfers 333% increase in payroll diversion scams as attackers evolve their tactics 61% of phishing threats reported by employees are false-positives 5.8 Billion malicious emails crafted by scammers spoof corporate URL domains Use of BIMI by companies jumps 82% FOSTER CITY, Calif. and LONDON (March 3, 2021) -- Agari, the...
Blog

Agari Report: New BEC Scam 7X More Costly Than Average, Bigger Phish Start Angling In

Sophisticated new threat actors, evolving phishing tactics, and a $800,000 business email compromise (BEC) scam in the second half of 2020 all signal big trouble ahead, according to new analysis from the Agari Cyber Intelligence Division (ACID). As captured in our H1 2021 Email Fraud & Identity Deception Trends Report , successful attacks on Magellan Health, GoDaddy, and the SolarWinds "hack of...
Blog

Cosmic Lynx Returns in 2021 with Updated Tricks

In July 2020, we published a report on a Russian-based BEC group we called Cosmic Lynx . In that report , we described the tactics used by the group, which included its targeting of senior executives at large companies with a global footprint and how it uses mergers and acquisitions (M&A) themes in its BEC email lures. Shortly after we published the report, we saw a significant decrease in Cosmic...
Press Release

Tracy Pallas of Agari Recognized as 2021 CRN® Channel Chief

FOSTER CITY, Cali. and LONDON (Feb. 8, 2021) – Agari, the Trusted Email Identity company, today announced that CRN® , a brand of The Channel Company , has named Tracy Pallas, vice president of worldwide channel sales and EMEA region, to its 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list, released annually, recognizes leading IT channel vendor executives who continually...
Press Release

Cybersecurity Industry Leaders Join Forces at Trust 2021 to Fight Back Against Cybercriminals

More than 5,000 CISOs, information security influencers, and decision-makers will exchange knowledge on threat intelligence, data science, and automated response capabilities to build a more resilient ecosystem Global 2000 companies will share best practices used to protect the global supply chain from vendor email compromise in the wake of recent data breaches Keynote speaker, Kimberly Bryant...
Press Release

Are Organizations Neglecting Business Email Compromise?

While ransomware is rightly positioned as the most immediate cybersecurity threat, businesses shouldn't underestimate the threat business email compromise (BEC) attacks present to organizations. In this article, Ciaran Rafferty, Managing Director,, discusses the release of the NCSC’s annual review for 2021 and looks at the implications for email security. Originally published in Computing Security...
Blog

Email Security: Agari Delivers a Whole New Level of Actionable Insight to Outpace Threat Actors

CISOs and their teams are about to get some serious performance enhancers in their high-stakes race against email security threats. According to the FBI, phishing campaigns, business email compromise (BEC) scams, and other advanced email attacks have resulted in $26 billion in business losses over the course of three years. Then 2020 happened. With 75 million corporate employees even now still...
Press Release

Agari Outperforms Fourth Quarter and Full Year 2020 Expectations; Uncovers Cybercriminals Behind COVID-19 Unemployment Fraud; Earns Industry Recognitions for Innovation

FOSTER CITY, CA and LONDON (Jan. 6, 2021) -- Agari, the market share leader in phishing defense solutions for the enterprise, today announced performance results for its fiscal fourth quarter and full year ended December 31, 2020. Highlights include: 33% global customer growth First to identify one of the cybercriminal rings behind U.S. CARES Act Fraud First to uncover Russian “BEC” cybercriminal...
Blog

How to Make Oauth2 Play Nice with EKS Ingress

Over the course of my technical career, I’ve always thought of Oauth2 to, frankly, be a bit of a pain. Oauth2 offers a mind boggling amount of possibilities and is the basis of many authorization workflows. However, I have found the documentation and supporting examples of how to integrate Oauth2 somewhat lacking. I hope that someone out in the ether will find this blog post and save a few days of...
Blog

What is Email Spoofing & How to Stop Attackers from Spoofing Your Email Address

What is email spoofing, how does it work, and why is it so dangerous to your company? We’ll explain everything you need to proactively stop attackers from spoofing your email address. Email Spoofing: What Is It? Email spoofing is when a fraudster forges an email header’s ‘From’ address to make it appear as if it was sent by someone else, usually a known contact like a high-level executive or...
Blog

BEC Response Guide— Tips for Responding to Business Email Compromise Incidents

This post originally appeared on Medium and is published here courtesy of Ronnie Tokazowski. For more by Ronnie, follow him on Twitter @iHeartMalware . If you’re reading this and are in the middle of an incident, go to the first bullet now . The rest can wait. Malware incidents suck, but if you want to know what it’s like responding to a BEC incident, triple the carnage, shake the snow globe, set...
Blog

BEC Cash-out Methods: Email Fraudsters Experimenting With Alternative Approaches

Business email compromise ( BEC ) actors are exploring alternative cash-out methods for spiriting away the profits from their crimes. Traditional bank accounts have long been the go-to choice for email scammers seeking to cash out the funds they've pilfered from organizations they victimize. Just since 2016, BEC groups have defrauded businesses out of more than $26 billion worldwide. But over the...
Blog

BEC Attacks: What They Are, How to Spot Them, and What to Do

Here we’ll cover what BEC attacks are, how they work, what they usually look like, and how to handle them. What is a BEC Attack? 7 Common BEC Attack Patterns Top Identity Deception Techniques How Can BEC Attacks be Stopped? What's the Best Way to Recover From a BEC Attack? What is a BEC Attack? First, let me explain what a BEC attack is. In short, Business Email Compromise phishing occurs when...
Press Release

Agari Dispels Myth of Where Phishing Criminals are Located

FOSTER CITY, Calif. and LONDON (Oct. 13, 2020) -- Agari, the market share leader in phishing defense for the enterprise, unveiled today the results of a year-long investigation into geographic locations of business email compromise (BEC) cybercriminals. Today’s announcement pinpoints for the first time where email scammers are located globally and maps their tangled web of money mules. Agari Cyber...
Blog

The Global Reach of Business Email Compromise (BEC)

Over the last five years, Business Email Compromise (BEC) has evolved into the predominant cyber threat businesses face today. Since 2016, businesses have lost at least $26 billion as a result of BEC scams and, based on the most recent FBI IC3 report , losses from BEC attacks grew another 37 percent in 2019—accounting for 40 percent of all cybercrime losses over the course of the year. The...
Blog

Agari Fall ' 20 Release Boosts CISO Confidence in Enterprise DMARC Deployment

With cyber gangs leveraging business email compromise (BEC) attacks that actively exploit their targets' level of DMARC adoption, CISOs have been ratcheting up email security. Until now, the need to dial up defenses against imposters posing as senior executives in email attacks has been increasingly forcing legitimate business correspondence into quarantine. The chain reaction kneecaps commerce...