Mail relays – Part 2 | Problems with forwarded mail?

Forwarded mail can be more trouble than it’s worth - especially when it’s done without checks, validation, or spam filtering. Typos, unintended recipients, and forged senders can quickly snowball into blocklistings and ...

Mail relays – Part 1 | Authenticate your outgoing mail!

Email authentication used to be something only big players worried about. Not anymore. While small senders may not feel the heat yet, it’s only a matter of time before it reaches them ...
tool, atlantis, credentials, protecting data

Hackers Use Atlantis AIO Tool to Automate Account Takeover Attacks

Atlantis AIO, a tool available to hackers on the dark web, gives threat actors an automated tool to rapidly test millions of stolen credentials against email, ecommerce, and other online accounts on ...
Security Boulevard

Query the legacy DNSBLs via Microsoft? Move to Spamhaus Technology’s free Data Query Service

If you're using the free legacy DNS Blocklists (DNSBLs) through the Public Mirrors while running on Microsoft’s infrastructure, you'll need to make a few small adjustments to your email setup. These changes ...
3 Reasons to Visit IRONSCALES at RSA Conference 2025

3 Reasons to Visit IRONSCALES at RSA Conference 2025

The countdown is on for RSA Conference 2025 in San Francisco, and we're excited to connect with you at the industry’s premier cybersecurity event! See our cutting-edge email security platform in action—visit ...
phishing, digital fraud, emails, perimeter, attacks, phishing, simulation, AI cybersecurity

Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal

A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what ...
Security Boulevard

If you query the legacy DNSBLs via Hetzner move to Spamhaus Technology’s free Data Query Service

Currently accessing the free legacy DNS Blocklists (DNSBLs) via the Public Mirrors, and using Hetzner's network? You'll need to make some minor changes to your email infrastructure. The changes are simple to ...

Enhancing Email Security: The Pivotal Role of AI in Defending Against Evolving Cyber Threats

| | bec, Blog, email security
Malware’s rise presents a rigorous challenge for organizations, meaning their security teams must remain ever-vigilant. Unfortunately, business email compromise (BEC), which takes advantage of communication channel vulnerabilities, has become a significant attack ...
Best of 2024: Microsoft Account Security Alert Email: Recognize the Scam

Best of 2024: Microsoft Account Security Alert Email: Recognize the Scam

| | Blog, email security
Reading Time: 5 min Have you received a microsoft account security alert email? Learn how to identify legitimate alerts and avoid phishing scams targeting your Microsoft account ...

Truffe via PEC – Far perdere tempo e denaro alle aziende italiane

In questo articolo condividiamo un caso dove dei criminali hanno utilizzato delle credenziali rubate ad un ignaro imprenditore per spedire centinaia di PEC malevoli ad altrettanto ignari altri utilizzatori di PEC, causando ...