Traditional email security products struggle to detect email impersonation threats such as Business Email Compromise (BEC) and spear phishing campaigns. These threats consistently bypass defenses that rely on signatures and policies like Secure Email Gateways and native-cloud email filters. This guide breaks down how Fortra uses advanced data science, including machine learning models, to find and mitigate attacks that slip past traditional email defenses.
As Microsoft’s security capabilities continue to evolve, many organizations are questioning how much they should rely on Microsoft for their email security needs. In this guide, we observe where Microsoft may not be enough and how deploying Fortra Advanced Email Security solutions can provide a more comprehensive protection.
This white paper takes an expansive look at the hidden threats lurking around email inboxes, and how layered email security with a clear understanding of goals can keep your organization better protected.
Table of Contents
Who is Scarlet Widow?
Femmes Fictionale and Counterfeit Romeos
The Long Con: Making Moves for Money
Starry Eyes for Starling Michael
Up Close and Personal: The Case of "Robert Blackwell"
...
The Director of Security from Snowflake Computing spoke about how Fortra's Cloud Email Protection kept their company safe from executive impersonation attacks, and much more.
Listen to Bill Burns, Chief Trust Officer and VP of Business Transformation for Informatica, speak about his experience working with Fortra's Agari.
Transcript
I'm Bill Burns, Chief Trust Officer and VP of Business Transformation for Informatica. I've been working with Fortra's Agari for about six years at previous companies, introducing them to solve...
Executive Summary
Los Angeles Federal Credit Union (LAFCU) was in the crosshairs of email scammers. Its brand was constantly being spoofed, putting its members at risk of being defrauded. The CTO prioritized email security as part of his broader risk management strategy, and selected Agari as his partner. That was more than a decade ago. Today, domain spoofing is at near-zero.
"Our initial goal...
Listen to Francisco Miranda, Information Security Officer & IT Manager of the American College of Radiology, on his experience working with Fortra's Agari.
Credential phishing leads to compromised accounts, and compromised accounts lead to more credential phishing.
In order to uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts, including
How...
Organized criminals are targeting businesses with identity deception attacks that cause financial losses and broken trust, but Agari is changing the game. Using responsible active defense techniques to analyze criminal email accounts, the Agari Cyber Intelligence Division (ACID) unmasked 10 cybercriminal groups during a 10-month period. ACID has used the results of its work to:
Warn financial...
Cosmic Lynx is a Russia-based BEC cybercriminal organization that has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.
In this threat dossier, you’ll discover key details about Cosmic Lynx, including:
How Cosmic targets global corporations with incredibly sophisticated BEC attacks
How Cosmic Lynx exploits DMARC controls to impersonate...
Exaggerated Lion is a BEC cybercrime ring that operates out of Africa with members in Nigeria, Ghana, and Kenya.
This is one of the most prolific BEC groups ever discovered, targeting more than 3,000 employees at nearly 2,100 companies throughout the United States.
Download this report for details including:
How they name, register and host domains disguised to mimic trusted infrastructure.
...
The secure email gateway no longer works for business email compromise and advanced email threats. Discover why you need the Fortra Advanced Email Security.
Frost & Sullivan has released the Frost Radar: Email Security, providing a benchmarking system to help you protect your email from cyber attacks.
Download the report for more information about:
Why email is a top threat vector for cyber attacks, and how working from home has increased the risk
How the email security market will continue to grow as more organizations transition to the cloud,...
Discover why cybercriminals target enterprise email channels for phishing schemes and how you can protect yourself from phishing by implementing DMARC.
While many cybercriminal gangs scam medium-sized and large corporations, Agari has now uncovered and documented the practices of a Nigeria-based scammer group, dubbed Scarlet Widow, that has evolved a different strategy focused on more vulnerable sectors such as school districts, universities, and nonprofits.
In this report, we uncover:
How Scarlet...