Type to search
Analyze a fileFree Tools

Blog: email security

Can You Spot the Social Engineering Techniques in a Phishing Email?

Even poorly written phishing emails use certain social engineering techniques to get users to download and open malicious attachments.

read more

We Released an Advanced Email Security Comparison Guide

To help organizations sort through the different email security solutions available, we have put together a comparison guide for advanced email security.

read more

Stop Dangerous Ursnif Phishing Attacks with Data Sanitization

A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?

FormBook Is the Latest Example of Malware-as-a-Service

FormBook malware is targeting South Korea and the U.S. and spreads via malicious email attachments, including malicious PDF, Word, and archive files.

read more

Top 5 Ways to Keep Email Inboxes Secure

Email is the primary vector for targeted cyber attacks. If you have not taken steps to increase your organization's email security, it's time to start!

VMRay Guest Post: Fake Microsoft Word Invoice Hides Malware

Attackers often use social engineering to convince users to enable Microsoft Office macros. Guest author Rohan Viegas of VMRay analyzes an example.

read more

Important Updates Made to Metadefender.com

We've made some changes to Metadefender.com. Updates include changing the layout for easier navigation and adding new pages that display our threat research.

OPSWAT Enhances Metadefender Email Security with Release of Metadefender Email Security v3.14.0

OPSWAT has announced the release of Metadefender Email Security v3.14.0, which enriches the product's capabilities with a standalone mail agent installer and other new features.

Beware of Email Attachments That Seem Harmless

Malware often enters networks through email attachments, including SVG and LNK files. Content Disarm and Reconstruction (data sanitization) can prevent this.

The Best Way to Stop Document-Borne Malware

Document-borne malware, often found in email attachments, is extremely dangerous. Content Disarm and Reconstruction is the best way to combat document malware.

Follow Us

Get our latest research and news in your inbox monthly