email security

Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw 2025-05-22 at 20:08 By Ryan Naraine Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch. The post Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw appeared first on SecurityWeek. This article is an excerpt from SecurityWeek […]

React to this headline:

Loading spinner

Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw Read More »

Critical OpenPGP.js Vulnerability Allows Spoofing

Critical OpenPGP.js Vulnerability Allows Spoofing 2025-05-21 at 10:16 By Eduard Kovacs An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification to be spoofed.  The post Critical OpenPGP.js Vulnerability Allows Spoofing appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Critical OpenPGP.js Vulnerability Allows Spoofing Read More »

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments 2025-05-19 at 16:01 By Discover how Trustwave MailMarshal Integrated Cloud enhances your Microsoft 365 environment security. Learn how Trustwave MailMarshal Integrated Cloud’s API-seamlessly integrates with M365. Trustwave MailMarshal secure email service now offers an integrated cloud solution to bolster your defenses against

React to this headline:

Loading spinner

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments Read More »

Russian APT Exploiting Mail Servers Against Government, Defense Organizations

Russian APT Exploiting Mail Servers Against Government, Defense Organizations 2025-05-16 at 13:15 By Ionut Arghire Russia-linked APT28 has been exploiting mail server vulnerabilities against government and defense entities since September 2023. The post Russian APT Exploiting Mail Servers Against Government, Defense Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Russian APT Exploiting Mail Servers Against Government, Defense Organizations Read More »

Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal

Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal 2025-05-15 at 15:24 By Eduard Kovacs Enterprise cybersecurity giant Proofpoint is buying Germany-based Microsoft 365 security solutions provider Hornetsecurity. The post Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Read More »

Russia-linked hackers target webmail servers in Ukraine-related espionage operation

Russia-linked hackers target webmail servers in Ukraine-related espionage operation 2025-05-15 at 12:01 By Help Net Security ESET researchers have uncovered RoundPress, a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities. Behind it is most likely the Russia-aligned Sednit (also known as Fancy Bear or APT28) cyberespionage group, holding the ultimate goal of stealing confidential

React to this headline:

Loading spinner

Russia-linked hackers target webmail servers in Ukraine-related espionage operation Read More »

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider 2025-05-02 at 19:32 By The UK retail market has been thrown into turmoil in recent weeks, with three of that nation’s highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. This article is an

React to this headline:

Loading spinner

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider Read More »

Why Microsoft Email Security Benefits from a Layered Approach

Why Microsoft Email Security Benefits from a Layered Approach 2025-05-02 at 16:03 By Doug Olenick The best secure email gateways mimic the tried and true “defense in depth” cybersecurity strategy by using a layered approach, including advanced features that make effective use of AI. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Why Microsoft Email Security Benefits from a Layered Approach Read More »

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms 2025-05-02 at 16:03 By Pauline Bolaños A quarter century ago, a former computer science student from the Philippines accidentally unleashed one of the most destructive computer viruses in modern history. This article is an excerpt from SpiderLabs Blog View Original Source React

React to this headline:

Loading spinner

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms Read More »

Low-tech phishing attacks are gaining ground

Low-tech phishing attacks are gaining ground 2025-05-01 at 07:02 By Help Net Security Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email security trends from the first quarter of 2025. Callback

React to this headline:

Loading spinner

Low-tech phishing attacks are gaining ground Read More »

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs 2025-04-30 at 16:03 By As detailed in the 2025 Trustwave Risk Radar Report, cybercriminals are increasingly targeting the manufacturing sector with sophisticated phishing tactics, exploiting both human behavior and trusted platforms. Trustwave SpiderLabs researchers uncover the most prevalent phishing lures—file-sharing notifications, HR documents, fake payment

React to this headline:

Loading spinner

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs Read More »

CISA warns about actively exploited Broadcom, Commvault vulnerabilities

CISA warns about actively exploited Broadcom, Commvault vulnerabilities 2025-04-29 at 15:47 By Zeljka Zorz The Cybersecurity and Infrastructure Security Agency (CISA) has added three new flaws to its Known Exploited Vulnerabilities catalog on Monday, affecting Commvault (CVE-2025-3928), Active! Mail (CVE-2025-42599), and Broadcom Brocade (CVE-2025-1976) solutions. CISA’s KEV catalog is constantly updated and provides IT admins

React to this headline:

Loading spinner

CISA warns about actively exploited Broadcom, Commvault vulnerabilities Read More »

FBI 2024 IC3 Report: Phishing Soars, Ransomware Batters Critical Infrastructure as Cyber Losses Climb

FBI 2024 IC3 Report: Phishing Soars, Ransomware Batters Critical Infrastructure as Cyber Losses Climb 2025-04-25 at 16:02 By Phishing, ransomware, and data breaches remain top threats, driving a sharp rise from $12.5 billion in 2023. With over 193,000 reports and $70M in losses, phishing outpaced extortion and data breaches as the most common cybercrime in

React to this headline:

Loading spinner

FBI 2024 IC3 Report: Phishing Soars, Ransomware Batters Critical Infrastructure as Cyber Losses Climb Read More »

Why Image Analysis is a Crucial Component of an Email Security Solution

Why Image Analysis is a Crucial Component of an Email Security Solution 2025-04-24 at 18:12 By While it’s well-known that email represents a significant source of cybersecurity threats, it’s not just the text included in emails that’s worrisome; images can be malicious as well. What’s more, images in emails may also present a threat of

React to this headline:

Loading spinner

Why Image Analysis is a Crucial Component of an Email Security Solution Read More »

AI-Powered Polymorphic Phishing Is Changing the Threat Landscape

AI-Powered Polymorphic Phishing Is Changing the Threat Landscape 2025-04-24 at 14:32 By Stu Sjouwerman Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates. The post AI-Powered Polymorphic Phishing Is Changing the Threat Landscape appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

AI-Powered Polymorphic Phishing Is Changing the Threat Landscape Read More »

Legacy Google Service Abused in Phishing Attacks

Legacy Google Service Abused in Phishing Attacks 2025-04-22 at 14:15 By Ionut Arghire A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections. The post Legacy Google Service Abused in Phishing Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Legacy Google Service Abused in Phishing Attacks Read More »

Rethinking the Human Factor in Cybersecurity

Rethinking the Human Factor in Cybersecurity 2025-04-17 at 16:52 By Rethink human involvement in cybersecurity—it’s not about blame, but about designing systems that support human strengths and mitigate limitations. Explore how secure email gateways (SEGs) like Trustwave MailMarshal use AI-powered threat detection to outpace phishing tactics and reduce human error. Understand the psychological triggers behind phishing attacks

React to this headline:

Loading spinner

Rethinking the Human Factor in Cybersecurity Read More »

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks 2025-04-10 at 23:16 By Bernard Bautista and Kevin Adriano Ever thought an image file could be part of a cyber threat? The Trustwave SpiderLabs Email Security team has identified a major spike in SVG image-based attacks, where harmless-looking graphics are being used to hide dangerous links. This

React to this headline:

Loading spinner

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks Read More »

Tycoon2FA New Evasion Technique for 2025

Tycoon2FA New Evasion Technique for 2025 2025-04-10 at 19:36 By Phil Hay, Rodel Mendrez The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past endpoints and detection systems. These include using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection.

React to this headline:

Loading spinner

Tycoon2FA New Evasion Technique for 2025 Read More »

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows 2025-04-09 at 20:02 By Kevin Townsend Agentic AI has improved spear phishing effectiveness by 55% since 2023, research shows. The post AI Now Outsmarts Humans in Spear Phishing, Analysis Shows appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows Read More »

Scroll to Top