Even poorly written phishing emails use certain social engineering techniques to get users to download and open malicious attachments.
To help organizations sort through the different email security solutions available, we have put together a comparison guide for advanced email security.
A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?
FormBook malware is targeting South Korea and the U.S. and spreads via malicious email attachments, including malicious PDF, Word, and archive files.
Email is the primary vector for targeted cyber attacks. If you have not taken steps to increase your organization's email security, it's time to start!
Attackers often use social engineering to convince users to enable Microsoft Office macros. Guest author Rohan Viegas of VMRay analyzes an example.
We've made some changes to Metadefender.com. Updates include changing the layout for easier navigation and adding new pages that display our threat research.
OPSWAT has announced the release of Metadefender Email Security v3.14.0, which enriches the product's capabilities with a standalone mail agent installer and other new features.
Malware often enters networks through email attachments, including SVG and LNK files. Content Disarm and Reconstruction (data sanitization) can prevent this.
Document-borne malware, often found in email attachments, is extremely dangerous. Content Disarm and Reconstruction is the best way to combat document malware.