Discover our Blog

August 18, 2022

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at scale with str...
Discover now

August 18, 2022

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at scale with str...
Discover now

August 11, 2022

3 Types of Spear Phishing Emails and How MSPs Can Prevent Them

Discover now ›

July 26, 2022

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Discover now ›

July 21, 2022

Email Threat Detection: What MSPs Need to Know

Discover now ›

June 30, 2022

Hacker Impersonates TrustWallet in Crypto Phishing Scam

Discover now ›

June 16, 2022

Ransomware Attacks: Why Email Is Still the #1 Delivery Method

Discover now ›

June 09, 2022

The Challenges of Phishing Detection (Part 1)

Discover now ›