What is phishing, social engineering, and spear phishing?

Blog

Top cybersecurity stories of 2019

2019 was a wild ride in the world of cybersecurity, with big stories around network security, data privacy protection, and the...

Securing your organization’s human layer

We all make mistakes. In fact, making mistakes is a core part of the human experience, as it’s how we grow...

How to identify and mitigate phishing attacks

Business owners consider various cyberthreats when it comes to security planning. One of the older but most effective weapons in a...

The impact of spam and spoofed emails on your business

Despite the various methods to filter out unwanted email, spam still presents a number of challenges to organizations. While ordinary spam...

Why is email still the number one target of cybercriminals?

Despite the obvious benefits of email, it has a major downside: weak cybersecurity. In fact, as a mission-critical application for organizations...

What is business email compromise and how is it evolving?

Business email compromise (BEC) scams have been growing in prevalence and creativity over the past couple of years. Today, it is...

Important Email Security Tools

Email has become one of the most vital business communication tools. At the same time, with the evolution of cybercrime, it’s...

Don’t Trust That Email From Your Boss

Yes, you read that right, do not trust the email from your boss. It could be an impersonator disguised as your...

Post Delivery Detection and Security Orchestration Automation and Response (SOAR) capabilities in Graphus

The recently published report on email security by Gartner – Market Guide for Email Security, discussed Post Delivery Protection and M-SOAR....

BEC_attack

Graphus protects against Business Email Compromise (BEC) Scams

According to the recently released Verizon 2019 DBIR report, Social Engineering and BEC Scams contributed to 370 incidents and 248 confirmed...

Hackers are constantly evolving their attack strategies. Are your security tools keeping up?

Graphus® detects new types of attacks on nearly a daily basis. From using Microsoft Forms, or voicemail phishing attacks, to leveraging...

Graphus integrates with Splunk to enhance enterprise visibility into zero-day and targeted cyber attacks

Graphus feeds real-time phishing and business email compromise detections into Splunk for greater visibility and control [April 9, 2019 – Reston,...