The GreatHorn Threat Intelligence Team, alongside hundreds of responses from IT security...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
The Advantages of API Connected Cloud Email Security Solutions
Over the last 18 months, phishing and advanced threats have become a significantly more dangerous...
Rethinking Security Training with an All Remote Workforce
For most organizations, this week marks the fourth week of widespread and nearly universal...
CSS Used to Bypass SEGs in Latest Office 365 Voicemail Phishing Attack
Another Office 365 voicemail related phishing attack is here—and this time with a twist. This is...
Securing the Zoom Environment When Your Workforce is All Remote
Over the past few weeks, a tremendous number of changes have taken place around the world. For...
How to Protect Against Microsoft Subdomain Takeover
How to Protect Against Microsoft Subdomain Takeover In a blog post today, Vulnerability released...
FBI: Business Email Compromise Responsible for 51% of Internet Crime Losses
Last week, the FBI released the 2019 Internet Crime Report and once again, business email...