What's new
The Current Landscape of Email Security in the Middle East
The Middle East has become the global hub for major science and technology events. With the rising level of...Read More
Vendor Email Compromise (VEC) Attacks: An Emerging Danger
To understand the concept of VEC attacks (Vendor Email Compromise), it is important to first understand Business Email Compromise...Read More
Most Common Types of Email Attacks To Look Out For!
Emails have been continuously proving that they are the best communication channel in the corporate world. Most organizations are...Read More
Email Impersonation Attack are on the Rise
Fraudsters can take advantage of human vulnerabilities through email impersonation attack. Impersonation attacks have infinite variations and each one...Read More
Top Real-life Examples of BEC Attacks
Nowadays, BEC attacks are considered the most dangerous cyber threat for organizations and the most lucrative attack vector for...Read More
Impersonation Attacks Led By Email Phishing and Spoofing
“Among all the email impersonation attacks in 2020, 50% were phishing, 36% were scamming, 12% were BEC, and 2%...Read More
Email Security: An Important Defense Against Cyber Attacks
Email is the primary means of business communication, which makes its protection a major concern for organizations today. Email...Read More
BEC Attacks: A Global Enterprise Concern
Nowadays, BEC attacks have become one of the most remunerative lines of business for malicious actors. Every day new...Read More
Email Threats: A Gateway for Hackers
Email is the most useful business communication channel for organizations. But the biggest challenge is that it is one...Read More
How To Prevent Email Spoofing?
Have you ever wondered what could have caused your inbox to be full of spam emails? Have you ever...Read More