Tag: email

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

A critical vulnerability known as CVE-2024-39929 has been identified in Exim Mail Server, impacting versions 4.87 to 4.95.1. This vulnerability enables attackers to bypass security filters, posing a significant risk to email communications and the security of over 15 million...

/ July 17, 2024
New report: BEC accounts for 1 in 10 email attacks

New report: BEC accounts for 1 in 10 email attacks

Email-based social engineering threats are thriving as attackers continue to adapt and evolve their tactics to increase their chances of success. The latest analysis of email detection data by Barracuda researchers reveals that while the landscape remains dominated by mass phishing and general scamming attacks, there’s...

/ June 18, 2024
MSP Marketing
Obliterating three MSP marketing misconceptions

Obliterating three MSP marketing misconceptions

The marketing industry is a fascinating one. When you look up tips from experts, you’ll see all kinds of misconceptions, myths, and conflicting information. However, this isn’t because the experts don’t know what they are talking about. For one, the...

/ April 25, 2024
email
How to help your clients comply with new Google and Yahoo email requirements

How to help your clients comply with new Google and Yahoo email requirements

When it comes to email security, most of the focus is on what happens when a malicious email is received. Optimally, a multi-layered approach will help filter out phishing emails and other attacks via technology and user training. But some...

/ February 15, 2024
5 best practices for MSP email security

5 best practices for MSP email security

Email remains the primary entry point for most cyberattacks, whether phishing, ransomware, social engineering scams, or business email compromise (BEC). According to data from Barracuda, 75 percent of organizations were the victim of a successful email attack in 2022, and...

/ November 6, 2023
Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

/ September 20, 2023
novel phishing attacks
Threat Spotlight: 3 novel phishing tactics

Threat Spotlight: 3 novel phishing tactics

As cybercriminals work to make phishing attacks more effective, they are continually introducing new techniques and tactics to try to trick victims, bypass security, and avoid detection.

/ March 17, 2023