Resources

Guide

Cyber Etiquette Ebook

Our ‘Cyber Etiquette: A Guide to Today’s Top Cyber Threats’ is an educational piece designed to help readers better understand the cyber threats that organizations across the globe are facing as we collaborate online for business.
Blog

DMARC Adoption Up, But 85% of Fortune 500 Remains Vulnerable to Brand Hijacking

Adoption of Domain-based Message Authentication, Reporting, and Conformance (DMARC) has seen modest growth in recent months, with 6.1 million domains now possessing valid DMARC records, according to our new Q1 2019 Email Fraud & Identity Deception Trends Report . That's up from 5.3 million in October—a 15% increase in the number of domains protected against email-based "brandjacking" scams that...
Blog

Scarlet Widow Breaks Hearts and Empties Wallets via Romance Scam Operations

With Valentine’s Day celebrated around the world, today is a day full of love and joy—especially for those in committed relationships. People around the globe are celebrating their relationships by sending flowers and chocolates, enjoying fancy dinners, and writing love notes in greeting cards. Unfortunately, not all relationships are legitimate, and not everyone sees today as a celebration of...
Product Video

Watch a Short Demo of Agari Phishing Response

Agari Phishing Response prioritizes reported incidents, automating investigative analysis and triage, to elevate the most suspicious to the top of the list. Then, it reduces manual efforts with remediation workflows to accelerate time-to-containment.
Blog

Phishing Survey Finds Businesses Waste $2 Million a Year Chasing False Positives

If US-based companies don't start automating phishing incident response processes within their SOCs, they could be SOL, according to new data captured in our Q1 2019 Email Fraud & Identity Deception Trends Report . That's because while businesses strive to implement security controls to prevent phishing attacks and any subsequent data breaches, the Security Operations Centers they rely on to...
Blog

BEC Actors Exploiting Gmail “Dot Accounts” for Fun and Profit

Within the Agari Cyber Intelligence Division (ACID) , we regularly engage with BEC threat actors using active defense techniques . Recently, during one of our investigations into a group comprised of these threat actors, we observed several scammers taking advantage of a “feature” that Google has built into Gmail addresses. While Google sees this as an advantage of consumers, cybercriminals are...
Blog

Brand Marketing is the New Demand Generation

First, An Apology Sorry, demand generation professionals. We still love you and your jobs aren’t going away. But, as you are well aware, the B2B buyer journey has changed—dramatically. Your roles, measurements, data sources, and tool sets have also transformed. All for the better. Meanwhile, building quality pipeline is becoming harder, as is capturing the mindshare of time-starved buyers who are...
Product Video

Watch a Short Demo of Agari Phishing Defense

Agari Phishing Defense uses predictive, artificial intelligence and real-time insights from trillions of emails each year, and we stop 99.987% of the attacks that secure email gateways missed. How? Let's take a look.
Blog

Rising Romance Scams Cost Victims and Businesses Millions

A federal sting operation dubbed "Operation Gold Phish" has led to the arrest of nine people accused of bilking at least 18 victims out of $2 million through socially-engineered romance scams over the last two years. As first reported on December 19, the defendants are accused of manipulating victims into becoming unwitting money mules in an alleged wire fraud operation. According to the Chicago...
Blog

Healthcare Brand Impersonation Scams Targeting Consumers Can Cost You Millions

Memo to hospitals and healthcare providers: A growing number of phishing scams are targeting consumers—including your customers and patients—through email messages that appear to come from your brand. As these attacks continue to rise in coming months, they could cost consumers—and your brand—plenty. Without a doubt, the spear phishing and business email compromise schemes that target your...
Blog

New “BEC-as-a-Service” Trend Means Just About Anyone Can Launch an Attack

Business email compromise (BEC) fraud is a lucrative venture, and now that industry is expanding in a troubling way—by lowering the barrier to entry so that anyone with a couple hundred bucks can outsource a BEC attack. BEC criminals are organized, behaving in many ways like legitimate businesses . And just like any successful company in a growing industry, these criminals are looking to add...
Blog

M&As Put Your Company at Risk for BEC Losses and Data Breach Liability

Mergers and acquisitions can build your company's value overnight, but business email compromise (BEC) and data breaches can tear it down just as quickly. Too often, M&A announcements are followed by waves of BEC attacks against the companies involved, or by news that the target company was the victim of a data breach. To get the most value from a merger or acquisition, you need to know how to...
Blog

New Trend Sees BEC Gangs Focus on Executives for Payroll Diversion Scams

Human resources departments are the epitome of task ownership, carefully and efficiently connecting an organization’s needs with that of its employees. Employees in HR are tasked with recruitment, onboarding, and employee relations, and oftentimes handle payroll and benefits. Because of their wide reach, threat actors are now turning their attention to this organizational pipeline as they continue...
Blog

Phishing Attacks Set to Put Healthcare Under the Knife in 2019

As the healthcare industry closes the books on 2018, it is still reeling from more than 327 major data breaches that exposed personal health information (PHI) on at least 9.8 million US citizens this past year. Sixty percent of the attacks reported to federal authorities involved phishing or other email attacks , impacting up to 5.88 million individuals. And the costs can be steep. According to...
Press Release

Agari Appoints John Giacomini as Chief Revenue Officer

Foster City, CA – January 7, 2019 – Agari , the next-generation Secure Email Cloud that restores trust to the inbox, today announced it has appointed John Giacomini as Chief Revenue Officer (CRO). Giacomini joins Agari with more than 25 years of cybersecurity sales excellence. As Agari’s first CRO, Giacomini is tasked with growing all direct sales, channel sales, and customer success functions...
Blog

5 Reasons Why I Joined Agari as Chief Revenue Officer

More than $9 billion in direct losses from advanced email threats. $1 billion in ransomware payments. Six million personal identity records stolen every 24 hours—at an average cost of $7.9 million per breach. If you think the crushing losses stemming from an endless barrage of spear-phishing schemes, business email compromise (BEC) scams, and other advanced email attacks were bad in 2018, just...
Blog

Why Your Company Needs Third-Party Solutions for Microsoft Office 365

Osterman Research has released a new industry report warning that many organizations will likely need to augment their Microsoft Office 365 implementations with best-in-class, third-party solutions—especially when it comes to advanced email threat protection. That's not an indictment of Microsoft, mind you. In fact, Osterman researchers point out that O365 is quickly proving to be a capable and...
Blog

How to Discover and Contain Data Breaches in Minutes—Not Months

A breach itself is bad enough, but the time it takes an organization to discover and contain that breach is where the majority of costs are incurred. Just ask Marriott. Or Equifax. Or Under Armour. When a phishing attack occurs, it takes an average of 197 days before it's discovered —and an additional 69 days to contain it. In many cases, such as the recently discovered breach at Marriott, it can...
Blog

Inside the Identity Graph: How Predictive AI Beats BEC Scams

Our recent report on London Blue, the cybercrime network that has amassed a list of 50,000 finance executives targeted for upcoming business email compromise (BEC) scams was alarming. But what makes it worse is that London Blue is not the only group of sophisticated cybercriminals out there. Phishing and other email attacks have jumped 50% in the last three months. The FBI is warning accounting...
Blog

How an Elite Counterintelligence Team Investigates BEC Scams Worldwide

Marriott Hotels, Dunkin Donuts, even the House GOP. During the final quarter of 2018, a host of high-profile data breaches and cyberattacks have made major headlines. Some stemmed from business email compromise (BEC) scams, spear phishing campaigns, or other advanced email threats. Others are expected to help fuel such attacks in the future. A few might see somebody fight back through innovative...