
GreatHorn Blogs
Featured

Most Popular
More Blogs
Google and Open Redirects: Preventing Your Users from Becoming a Victim of Attacks
The GreatHorn Intelligence Team has identified an increase of 84% in phishing attacks leveraging...
Supply Chain Attacks: How to Defend Against Vendor Email Compromise
The GreatHorn Threat Intelligence Team, alongside hundreds of responses from IT security...
Bitcoin and Cryptocurrency: 2021 Email Extortion Trends
What are cryptocurrencies?Cryptocurrencies move over decentralized networks, with each computer...
OnlyScams: New GreatHorn Phishing Data Shows a Surge in X-Rated Attacks
Phishers exploit human nature, taking advantage of individuals, combining social psychology,...
How Much Risk Is Already in Your Email Environment?
Today, most IT professionals understand that it’s impossible to stop every attack. That’s led to a...
Microsoft 365: You’ve Migrated, So What Can You Optimize?
Over the years, Microsoft has made its cloud offerings more attractive, motivating more and more...