Latest Blog Posts

  • Posted by Admin
  • On May 25, 2023
TA569: SocGholish and Beyond
Key Takeaways TA569 leverages many types of injections, traffic distribution systems (TDS), and...
Read more
  • Posted by Admin
  • On March 7, 2023
API Email Security Weaknesses
API email security services, like any technology, can have weaknesses that can potentially...
Read more
  • Posted by Admin
  • On February 8, 2023
Emerging Cyber Security Attacks and Threats
Cybersecurity is an ever-evolving field, and as technology advances, so do the methods...
Read more
  • Posted by Admin
  • On February 8, 2023
Business Email Compromise Threats
Business email compromise (BEC) is a growing threat to businesses of all sizes....
Read more
  • Posted by Admin
  • On February 8, 2023
Email Security Threats 2023
Email has become an indispensable tool for communication in the modern world. With...
Read more
  • Posted by Admin
  • On November 9, 2022
GDPR Training for Employees – Security Awareness
Scenario-Based Security Awareness Training Teaches Users to Make Better Decisions – Proofpoint Essentials...
Read more
  • Posted by Admin
  • On March 2, 2022
Monitoring the Situation in Ukraine
Spambrella and Proofpoint Threat Information Services (TIS) regularly provides updates to its customers...
Read more
  • Posted by Admin
  • On February 8, 2022
Proofpoint Essentials MSP Services – Enterprise-Class Security for SMB’s
Proofpoint Essentials MSP services leverage the same enterprise-class security that powers some of...
Read more
  • Posted by Admin
  • On October 18, 2021
Top Email Security Gateway Services
With the ever-evolving landscape of email security services comes the ‘question’… ‘what are...
Read more
  • Posted by Admin
  • On April 30, 2021
Spambrella Wins Queen’s Award for Enterprise
Spambrella the Global Email Security and Corporate Governance company has been awarded a...
Read more
  • Posted by Admin
  • On October 26, 2020
What is Kovter Malware?
Kovter is a fileless malware that attempts to remain invisible and targets the...
Read more
  • Posted by Admin
  • On October 8, 2020
What is Emotet Malware and how is it Delivered?
Emotet originally arrived on the scene as a new banking trojan in 2014....
Read more
  • Posted by Admin
  • On June 4, 2020
What is LNKR Google Chrome Extension Malware?
LNKR malware uses browser extensions in Googles Chrome to track browsing movements and...
Read more
  • Posted by Admin
  • On June 3, 2020
The Email Laundry End of Life?…
June 1st 2020: Fireeye end of life The Email Laundry email security service....
Read more
  • Posted by Admin
  • On June 1, 2020
Is it time to consider leaving Symantec Email Security.cloud (MessageLabs)?
With the ever-changing email security market, is now the time to consider leaving...
Read more
  • Posted by Admin
  • On May 7, 2020
FINRA: Phishing Emails Targeting Financial Companies
On Monday, May 4th, **FINRA (Financial Industry Regulatory Authority), issued a warning to...
Read more
  • Posted by Admin
  • On May 6, 2020
Guarding Against Work-From-Home Phishing Threats
By this stage, everyone is familiar with the phrase ‘social distancing’ and what...
Read more
  • Posted by Admin
  • On May 6, 2020
The Changing Face of Email Security
With the rise of remote work, especially in recent months, and the number...
Read more
  • Posted by Admin
  • On April 24, 2020
New Coronavirus Flavoured Phishing Email Scams
Email scams are nothing new, just about everyone has heard of that one...
Read more
  • Posted by Admin
  • On January 24, 2020
What is typosquatting?
Hackers and cyber criminals have evolved social engineering tactics to trick unsuspecting individuals...
Read more
  • Posted by Admin
  • On January 10, 2020
Travelex Still Offline Following Ransomware Attack
Not only have Global banks stopped customers transacting or ordering currency from Travelex,...
Read more
  • Posted by Admin
  • On December 31, 2019
What’s the Difference Between Spear Phishing and Whaling?
Phishing is a broadly understood risk when it comes to internet security –...
Read more
  • Posted by Admin
  • On December 17, 2019
Hackensack Meridian Health Pays Attackers Ransom
The largest hospital system in New Jersey said it paid an extortion fee...
Read more
  • Posted by Admin
  • On December 11, 2019
What’s the Difference Between Spyware and Malware?
Spyware and malware are both considerable threats when it comes to your computer’s...
Read more
  • Posted by Admin
  • On December 11, 2019
Using Email Encryption to Protect Your Business
Email encryption isn’t just for big businesses. It’s an important aspect that needs...
Read more
  • Posted by Admin
  • On December 5, 2019
What is Dridex malware?
What is Dridex malware? Dridex is malicious software (malware) that targets banking and...
Read more
  • Posted by Admin
  • On December 3, 2019
What is Sextortion?
What is Sextortion? Sextortion is a way of criminally extorting money from a...
Read more
  • Posted by Admin
  • On November 29, 2019
What is Ransomware?
So what is Ransomware? Ransomware is a type of malicious program/application that gains...
Read more
  • Posted by Admin
  • On November 29, 2019
Michigan Practice Brookside ENT Closes Doors Following Ransomware Attack
The ransomware attack encrypted the computer systems at Brookside ENT and Hearing Center...
Read more
  • Posted by Admin
  • On November 29, 2019
Ransomware Attack Cause of Wood Ranch Medical Permanent Closure
Wood Ranch Medical has announced it will be permanently closing its doors as...
Read more
  • Posted by Admin
  • On November 20, 2019
What is a malicious URL?
The potential risk of a malicious URL and the harm in which they...
Read more
  • Posted by Admin
  • On November 17, 2019
Everything you Need to Know about Phishing
Considering we now spend more and more time online, it’s only natural that...
Read more
  • Posted by Admin
  • On September 23, 2019
How to Secure Outbound Emails
When it comes to securing email, most network admins focus on inbound security...
Read more
  • Posted by Admin
  • On September 2, 2019
Closer Look at Email Fraud
The number of fraudulent email circulations seems to grow with each passing day....
Read more
  • Posted by Admin
  • On August 16, 2019
What’s the Difference Between Malware and Viruses?
If you’re not in the IT industry, all the technical terms for malicious...
Read more
  • Posted by Admin
  • On June 5, 2019
Impostor Email Attacks Increased More than 60% Year-Over-Year
Impostor email attacks are a growing trend and problem. Attackers will target your...
Read more
  • Posted by Admin
  • On June 4, 2019
Office 365 Phishing Attacks: Educating Our Attackers…
Why are hackers increasing levels of Office 365 phishing attacks? This article will...
Read more
  • Posted by Admin
  • On March 6, 2019
User Interface 6.0 BETA – Available to Spambrella Partners Today!
General Availability Notice We are proud to announce the release of beta user...
Read more
  • Posted by Admin
  • On February 25, 2019
Email Security Trends & 2019 – Quality Over Volume!
Year after year we look at the trends and likely scenarios which will...
Read more
  • Posted by Admin
  • On December 6, 2018
Office 365 Email Security – The Hidden Costs
You’ve made the big decision to migrate to Microsoft Office 365. Its array...
Read more