Join the waitlist >>

Why Traditional Email Filters Aren’t Enough to Stop Phishing in K–12

How to stop phishing in K-12 using artificial intelligence Phishing is one of the most common—and most damaging—cybersecurity threats facing K–12 schools today. And yet, many districts still rely on basic, built-in ...
Join the waitlist >>

In The News | ManagedMethods Helps K-12 Schools With Launch of Advanced Phishing AI Solution

View the original press release on Newswire. ManagedMethods introduces first chain-of-thought (CoT) detection tool for K-12 schools BOULDER, Colo., June 3, 2025 (Newswire.com) – ManagedMethods, the leading provider of Google Workspace and Microsoft ...
Join the waitlist >>

How Artificial Intelligence Phishing Detection Is Reshaping K–12 Email Protection

Using Artificial Intelligence Phishing Detection to Outsmart Today’s Email Threats in K–12 Phishing emails are no longer riddled with spelling mistakes and shady links. Today’s threats are socially engineered, personalized, and increasingly ...

Stronger through sharing: PhishFort and Spamhaus working together

PhishFort - an anti-phishing specialist - has collaborated with Spamhaus to share verified threat data from their phishing detection systems. In this guest blog, Lucas Sierra, CEO of PhishFort, explains how making ...
Pause Take9

Why Take9 Won’t Improve Cybersecurity

There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the ...
K-12 Cybersecurity & Safety Web filtering, email security, data loss prevention, and student safety made easy

AI in K-12 Cybersecurity: Hype or Helpful?

Not all AI is created equal. Here’s how cybersecurity AI actually helps defend your district. From predictive grading tools to personalized learning platforms, artificial intelligence (AI) is quickly making its mark in ...
Protecting Against Brand Impersonation Attacks with Browser Detection and Response

Protecting Against Brand Impersonation Attacks with Browser Detection and Response

By Tejeswara S Reddy, Security Researcher, SquareXBrand impersonation attacks occur when threat actors create convincing replicas of legitimate websites, communications, or digital assets to deceive users into believing they are interacting with ...

Abuse takes its “toll” on .top: But who is paying the price?

Despite ICANN issuing a formal notice to .top citing a breach of contract for failing to address DNS abuse, the situation has not improved. Over the last six months, abuse of .top ...
social, businesses, engineering, IRONSCALES, deepfakes, identity, Nametag, deepfake, organizations, attacks, biometric, security, identity

IRONSCALES Extends Email Security Platform to Combat Deepfakes

IRONSCALES has extended the reach of the machine learning algorithms it uses to identify email anomalies to now include the video and audio files used to create deepfakes ...
Security Boulevard
Phishing 3.0: Trust, Deepfakes, and Why Your Inbox Might Betray You

Phishing 3.0: Trust, Deepfakes, and Why Your Inbox Might Betray You

| | deepfake, MSP/MSSP, Phishing
In his recent post, our CEO, Eyal Benishti, sounded the phishing alarm for all to hear. The message? The traditional foundation of digital business communication, trust, is collapsing under the weight of ...