Threat Spotlight: Bait Attacks
Here’s a closer look at the ways that attackers are using bait attacks and the techniques they’re using to avoid getting caught.
Threat Spotlight: Post-Delivery Email Threats
What happens after a malicious email bypasses an organization’s security measures and lands in a user’s inbox can be just as important as what happens to block threats in the first place.
Threat Spotlight: The Geography and Network Characteristics of Phishing Attacks
The country where emails originate and the number of countries they are routed through on the way to their final destination offer important warning...
Threat Spotlight: Automated attacks on web applications
Cybercrime has become big business, and scammers are increasingly turning to bots and automation to make their attacks more efficient and effective and help...
Barracuda Email Threat Scanner Detects Millions of Attacks Missed by Organizations’...
New and improved tool delivers enhanced reporting and redesigned user experience.
Threat Spotlight: When bad bots attack
The holiday shopping season makes e-commerce sites an attractive target for cybercriminals.
Threat Spotlight: Ransomware
Cybercriminals are leveraging the COVID-19 pandemic and remote work to wreak havoc on organizations.
Threat Spotlight: Malicious Accounts in Business Email Compromise
Beware of cybercriminals who create accounts with legitimate email services and use them to launch impersonation and business email compromise (BEC) attacks.
Threat Spotlight: Coronavirus-Related Phishing
Attackers are taking advantage of the widespread discussion of COVID-19 to prey on unsuspecting email users.