Phishing Incident Response
Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...
Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...

Romanian Cybercriminals Sentenced for Phishing Campaign
This week, the Department of Justice for the U.S. Attorney’s Office for the Northern District of Georgia announced the final of three sentences to be carried out by cybercriminals that plead guilty ...

The Most Common Types of Reported Emails
There are all sorts of things that end up in your inbox, but among those that are reported to a SOC or security team, malicious content only makes up a small percent ...

It Only Takes One to Detect or Infect
It’s time to take action against phish! Phishing attacks are no longer few and far between, they are the norm. Regardless of your company’s investments in filtering technologies and countermeasures, suspicious and ...

Hiding in Plain Sight: How Phishing Attacks are Evolving
Phishing attacks are supposed to be visible. If you can’t see them, how could anyone possibly fall for them? Since the dawning of time for phishing attacks there has been a constant ...

Finding Threats That Go Undetected
Phishing attacks have become increasingly sophisticated. From tricking users into sending confidential information to crafting well executed emails that can slip past the most advanced technology, social engineering is still incredibly effective ...