February 20, 2020
Experts from StealthMail and Microsoft will reveal why the banking, commercial and energy sectors continue to suffer huge losses from hacker groups and suggest effective protection methods. The presentation will include the insights from CISOs who have…
February 20, 2020
Business Email Compromise depleted multiple Puerto Rico government companies, particularly taking $2.1 million from the Industrial Development Company.
February 12, 2020
What are the most important things you need to keep an eye on when sending messages via email? Requisites. Without filling “To” and “Subject” spaces your email will go nowhere. Another fundamental thing is a digital signature, as you can identify the…
February 4, 2020
"One who is persistent will excel.”This quote gets a whole new meaning when we talk about TA505 aka ‘Evil Corp’ latest infection tactic. Microsoft Security Intelligence recently unveiled that this financially motivated group is back in action.
January 29, 2020
Applications delivery of through the “cloud” allows companies to have a flexible (accessible from any part of the world where a stable Internet connection is) and dynamic infrastructure.
January 28, 2020
StealthMail is proud to announce the release of “The Art of Email Security” – a peer production project designed to educate users about the #1 business communication channel and the main target of cyberattacks in 2020.
January 21, 2020
We’re in the twenties now! Those years promise to be full of political scandals, hacks, and cyberattacks of various magnitudes, judging by the past still fresh in collective memory.
January 15, 2020
Despite the fact that email occupies the first place in the field of business correspondence, this method of communication is one of the most vulnerable and unsafe in terms of preserving confidential information. By consolidating our vast experience and…
January 2, 2020
Advanced email threats such as zero-day, malware, ransomware, man-in-the-middle, social-engineering techniques, phishing attacks, and many others are real threats to an enterprise’s email. This list, or arsenal of cyber-weapons so to speak, is far from…