email security
Mail relays – Part 2 | Problems with forwarded mail?
Forwarded mail can be more trouble than it’s worth - especially when it’s done without checks, validation, or spam filtering. Typos, unintended recipients, and forged senders can quickly snowball into blocklistings and ...
Mail relays – Part 1 | Authenticate your outgoing mail!
Email authentication used to be something only big players worried about. Not anymore. While small senders may not feel the heat yet, it’s only a matter of time before it reaches them ...

Hackers Use Atlantis AIO Tool to Automate Account Takeover Attacks
Atlantis AIO, a tool available to hackers on the dark web, gives threat actors an automated tool to rapidly test millions of stolen credentials against email, ecommerce, and other online accounts on ...
Query the legacy DNSBLs via Microsoft? Move to Spamhaus Technology’s free Data Query Service
If you're using the free legacy DNS Blocklists (DNSBLs) through the Public Mirrors while running on Microsoft’s infrastructure, you'll need to make a few small adjustments to your email setup. These changes ...

3 Reasons to Visit IRONSCALES at RSA Conference 2025
The countdown is on for RSA Conference 2025 in San Francisco, and we're excited to connect with you at the industry’s premier cybersecurity event! See our cutting-edge email security platform in action—visit ...

Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal
A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what ...
If you query the legacy DNSBLs via Hetzner move to Spamhaus Technology’s free Data Query Service
Currently accessing the free legacy DNS Blocklists (DNSBLs) via the Public Mirrors, and using Hetzner's network? You'll need to make some minor changes to your email infrastructure. The changes are simple to ...
Enhancing Email Security: The Pivotal Role of AI in Defending Against Evolving Cyber Threats
Malware’s rise presents a rigorous challenge for organizations, meaning their security teams must remain ever-vigilant. Unfortunately, business email compromise (BEC), which takes advantage of communication channel vulnerabilities, has become a significant attack ...

Best of 2024: Microsoft Account Security Alert Email: Recognize the Scam
Reading Time: 5 min Have you received a microsoft account security alert email? Learn how to identify legitimate alerts and avoid phishing scams targeting your Microsoft account ...
Truffe via PEC – Far perdere tempo e denaro alle aziende italiane
In questo articolo condividiamo un caso dove dei criminali hanno utilizzato delle credenziali rubate ad un ignaro imprenditore per spedire centinaia di PEC malevoli ad altrettanto ignari altri utilizzatori di PEC, causando ...