At GreatHorn, we spend most of our time and effort on the most sophisticated email attacks that...
Phishing
What Are the 3 Phases of the Phishing Attack Kill Chain?
One of the primary concerns of cyber security leaders within organizations is phishing attacks....
Why Organizations Must Develop a Plan to Combat the Phishing Attack Kill Chain
If you have been in cyber security for any length of time, it is likely that you have heard about...
Wrap-Up: Preventing Phishing Scams in the New Perimeter-Less World
In Case You Missed It Paul Asadoorian, Matt Alderman and Kevin O’Brien discuss how phishing scams...
4 Phishing Scams You Need to Beware of This Holiday Season
With the holiday season just around the corner, it appears that online retailers will be the “go...
The Future of Sporting Events and Spear Phishing Attacks
The Coronavirus pandemic has changed several parts of the sports world, from canceling games to...
New Report Finds Email Users Failing Phishing Test
Can you accurately detect a phishing email when you receive one? That is the question GreatHorn...
[Webinar Wrap-Up] Facts vs Deception: Today’s Phishing Attack Landscape
Missed our webinar? Don’t worry – we’ve still got you covered. On September 17, 2020, Holger...
Layering Security Awareness into Your Email Security Approach
Phishing attacks grow more sophisticated with each passing year. As technology advances, so does...
What You Should Know about the State of Phishing Attacks in 2020
Phishing has long been the choice method for hackers and threat actors. Why? Well, it is easy to...