What's new
BEC Attack: Tips to Prevent Business Email Compromise
Every year many organizations become the victim of BEC attacks in which attackers target trusted email accounts to manipulate...Read More
Deceptive Emails Target the Oil and Gas Industry with Data-Stealing Malware
That’s where a new phishing campaign against the industry comes in. Disguised as critical vehicle incident reports, this phishing...Read More
Email Security: Best Practices to Protect Your Organization 2025
According to a report by Egress Email Security, 69% of organizations reported an increase in phishing attempts in 2024....Read More
Understanding the Threat: TA427 and Its Exploitation of DMARC
Your inbox can be a minefield. As a renowned US foreign policy expert, your insights are valuable, making you...Read More
Understanding SPF: Email Authentication Protocol
“Malicious actors send 3 billion spoofed emails every day and since 2016, organizations have lost over $26 billion due...Read More
Google & Yahoo’s New Anti Spam Policy
Email communication has long been a cornerstone of modern business and personal interactions. However, with the rising sophistication of...Read More
Configuring DKIM for Enhanced Email Security
We have always heard about how email authentication protocols like SPF, DKIM, and DMARC can help in enhancing email...Read More
What is BIMI and How Does It Improve Email Deliverability
In an age where email phishing attacks and overloaded inboxes are becoming routine affairs for businesses and consumers alike,...Read More
The Current Landscape of Email Security in the Middle East
The Middle East has become the global hub for major science and technology events. With the rising level of...Read More
Vendor Email Compromise (VEC) Attacks: An Emerging Danger
To understand the concept of VEC attacks (Vendor Email Compromise), it is important to first understand Business Email Compromise...Read More