Latest Blog Posts

  • Posted by Admin
  • On November 3, 2023
Why White Label Cloud Services are Important to MSP’s
Managed Service Providers (MSPs) play a crucial role in the modern IT landscape....
Read more
  • Posted by Admin
  • On October 11, 2023
Microsoft 365 targeted by Cybercriminals with LinkedIn Smart Links Cyber Attacks
LinkedIn has long been a go-to platform for professionals seeking to expand their...
Read more
  • Posted by Admin
  • On October 6, 2023
What is Qakbot Malware?
Malware remains a persistent and ever-present danger. Among the multitude of malware strains,...
Read more
  • Posted by Admin
  • On October 4, 2023
What Is Social Engineering with Email?
What Is Social Engineering with Email?: Email has become an integral part of...
Read more
  • Posted by Admin
  • On October 4, 2023
Email Continuity for Microsoft 365
Email Continuity for Microsoft 365: Ensuring Seamless Communication – In today’s fast-paced business world,...
Read more
  • Posted by Admin
  • On October 3, 2023
The Importance of Email Archiving
In today’s fast-paced digital world, email has become an integral part of both...
Read more
  • Posted by Admin
  • On September 28, 2023
Email Should Be Your No. 1 Security Priority
Email Should Be Your No. 1 Security Priority In today’s digitally connected world,...
Read more
  • Posted by Admin
  • On September 26, 2023
What are AI Phishing Attacks?
What are AI Phishing Attacks? A New Breed of Cyber Threats – Introduction:...
Read more
  • Posted by Admin
  • On September 26, 2023
Ethical Phishing: Testing Your Employees
The Art of Ethical Phishing Simulation: Testing Your Employees’ Cybersecurity Awareness In the...
Read more
  • Posted by Admin
  • On September 18, 2023
Why is Security Awareness Training Needed?
In today’s digital landscape, our personnel remain key targets in contemporary cyber threats,...
Read more
  • Posted by Admin
  • On September 13, 2023
Email Security: How Spambrella Stays Ahead
The Evolving Landscape of Email Security: How Spambrella Stays Ahead In today’s interconnected...
Read more
  • Posted by Admin
  • On September 13, 2023
The Evolution of Email Security
The Evolution of Email Security: A Look into the Future with Spambrella In...
Read more
  • Posted by Admin
  • On May 25, 2023
TA569: SocGholish and Beyond
Key Takeaways TA569 leverages many types of injections, traffic distribution systems (TDS), and...
Read more
  • Posted by Admin
  • On March 7, 2023
API Email Security Weaknesses
API email security services, like any technology, can have weaknesses that can potentially...
Read more
  • Posted by Admin
  • On February 8, 2023
Emerging Cyber Security Attacks and Threats
Cybersecurity is an ever-evolving field, and as technology advances, so do the methods...
Read more
  • Posted by Admin
  • On February 8, 2023
Business Email Compromise Threats
Business email compromise (BEC) is a growing threat to businesses of all sizes....
Read more
  • Posted by Admin
  • On February 8, 2023
Email Security Threats 2023
Email has become an indispensable tool for communication in the modern world. With...
Read more
  • Posted by Admin
  • On November 9, 2022
GDPR Training for Employees – Security Awareness
Scenario-Based Security Awareness Training Teaches Users to Make Better Decisions – Proofpoint Essentials...
Read more
  • Posted by Admin
  • On March 2, 2022
Monitoring the Situation in Ukraine
Spambrella and Proofpoint Threat Information Services (TIS) regularly provides updates to its customers...
Read more
  • Posted by Admin
  • On February 8, 2022
Proofpoint Essentials MSP Services – Enterprise-Class Security for SMB’s
Proofpoint Essentials MSP services leverage the same enterprise-class security that powers some of...
Read more
  • Posted by Admin
  • On October 18, 2021
Top Email Security Gateway Services
With the ever-evolving landscape of email security services comes the ‘question’… ‘what are...
Read more
  • Posted by Admin
  • On April 30, 2021
Spambrella Wins Queen’s Award for Enterprise
Spambrella the Global Email Security and Corporate Governance company has been awarded a...
Read more
  • Posted by Admin
  • On October 26, 2020
What is Kovter Malware?
Kovter is a fileless malware that attempts to remain invisible and targets the...
Read more
  • Posted by Admin
  • On October 8, 2020
What is Emotet Malware and how is it Delivered?
Emotet originally arrived on the scene as a new banking trojan in 2014....
Read more
  • Posted by Admin
  • On June 4, 2020
What is LNKR Google Chrome Extension Malware?
LNKR malware uses browser extensions in Googles Chrome to track browsing movements and...
Read more
  • Posted by Admin
  • On June 3, 2020
The Email Laundry End of Life?…
June 1st 2020: Fireeye end of life The Email Laundry email security service....
Read more
  • Posted by Admin
  • On June 1, 2020
Is it time to consider leaving Symantec Email Security.cloud (MessageLabs)?
With the ever-changing email security market, is now the time to consider leaving...
Read more
  • Posted by Admin
  • On May 7, 2020
FINRA: Phishing Emails Targeting Financial Companies
On Monday, May 4th, **FINRA (Financial Industry Regulatory Authority), issued a warning to...
Read more
  • Posted by Admin
  • On May 6, 2020
Guarding Against Work-From-Home Phishing Threats
By this stage, everyone is familiar with the phrase ‘social distancing’ and what...
Read more
  • Posted by Admin
  • On May 6, 2020
The Changing Face of Email Security
With the rise of remote work, especially in recent months, and the number...
Read more
  • Posted by Admin
  • On April 24, 2020
New Coronavirus Flavoured Phishing Email Scams
Email scams are nothing new, just about everyone has heard of that one...
Read more
  • Posted by Admin
  • On January 24, 2020
What is typosquatting?
Hackers and cyber criminals have evolved social engineering tactics to trick unsuspecting individuals...
Read more
  • Posted by Admin
  • On January 10, 2020
Travelex Still Offline Following Ransomware Attack
Not only have Global banks stopped customers transacting or ordering currency from Travelex,...
Read more
  • Posted by Admin
  • On December 31, 2019
What’s the Difference Between Spear Phishing and Whaling?
Phishing is a broadly understood risk when it comes to internet security –...
Read more
  • Posted by Admin
  • On December 17, 2019
Hackensack Meridian Health Pays Attackers Ransom
The largest hospital system in New Jersey said it paid an extortion fee...
Read more
  • Posted by Admin
  • On December 11, 2019
What’s the Difference Between Spyware and Malware?
Spyware and malware are both considerable threats when it comes to your computer’s...
Read more
  • Posted by Admin
  • On December 11, 2019
Using Email Encryption to Protect Your Business
Email encryption isn’t just for big businesses. It’s an important aspect that needs...
Read more
  • Posted by Admin
  • On December 5, 2019
What is Dridex malware?
What is Dridex malware? Dridex is malicious software (malware) that targets banking and...
Read more
  • Posted by Admin
  • On December 3, 2019
What is Sextortion?
What is Sextortion? Sextortion is a way of criminally extorting money from a...
Read more
  • Posted by Admin
  • On November 29, 2019
What is Ransomware?
So what is Ransomware? Ransomware is a type of malicious program/application that gains...
Read more