• Support
  • Dashboard Login
  • 
  • 
GreatHorn Inc.
GreatHorn, Inc logo
  • Product
    • Product Overview
    • Product Plans
    • Integrations
  • Solutions
    • By Platform:
      • Microsoft 365
      • Google Workspace
    • By Attack Type:
      • Executive Impersonations
      • Supply Chain Impersonations
      • Internal Employee Impersonations
      • External Impersonations
      • Internal Spearphishing
      • Payment Fraud
      • Credential Theft
      • Malicious Payloads
      • Malicious and Suspicious URLs
      • Microsoft 365
      • Google Workspace
      • Executive Impersonations
      • Supply Chain Impersonations
      • Internal Employee Impersonations
      • External Impersonations
      • Internal Spearphishing
      • Payment Fraud
      • Credential Theft
      • Malicious Payloads
      • Malicious and Suspicious URLs
  • Resources
    • Resource Center
    • Blog
  • Partners
    • Channel Partners
    • Technology Integration & Alliance Partners
    • MSP/MSSPs
    • Register a Deal
  • Company
    • About GreatHorn
    • Leadership
    • Trust & Security
    • Press Releases
    • Media Coverage
    • Contact Us
    • Careers
  • Start Free Trial

Media Coverage

  • Press Releases
  • Media Coverage
Home  /  Company  /  Media Coverage
Business inboxes bombarded with dangerous scams

Business inboxes bombarded with dangerous scams

Jun 22, 2021 |

read more
Many businesses say majority of email links actually lead to malicious sites

Many businesses say majority of email links actually lead to malicious sites

Jun 22, 2021 |

read more
How a Business Email Compromise attack can threaten your organization

How a Business Email Compromise attack can threaten your organization

Jun 22, 2021 |

read more
Most phishing attacks lure corporate users with explicit content

Most phishing attacks lure corporate users with explicit content

Jun 4, 2021 |

read more
Smutty Phishing: Attackers Are Sending X-Rated Emails To Lure Victims

Smutty Phishing: Attackers Are Sending X-Rated Emails To Lure Victims

Jun 3, 2021 |

read more
How X-rated phishing attacks try to blackmail their victims

How X-rated phishing attacks try to blackmail their victims

Jun 2, 2021 |

read more
COVID’s silver lining: The race to cloud-based cybersecurity quickens

COVID’s silver lining: The race to cloud-based cybersecurity quickens

May 16, 2021 |

read more
Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

May 14, 2021 |

read more
Breaking the Phishing Kill Chain

Breaking the Phishing Kill Chain

Apr 20, 2021 |

read more
Kevin O’Brien – TechStrongTV

Kevin O’Brien – TechStrongTV

Apr 12, 2021 |

read more
Malicious Payloads: Defending Your Organization Beyond “Known Bad” Lists

Malicious Payloads: Defending Your Organization Beyond “Known Bad” Lists

Apr 9, 2021 |

read more
How to better combat malware delivered through email

How to better combat malware delivered through email

Apr 7, 2021 |

read more
Page 2 of 14«12345...10...»Last »

Get Your FREE Email Threat Assessment

Learn what advanced threats are currently getting through your existing email security and into your end users’ mailboxes.

Get Started Now!
GreatHorn Logo
GreatHorn, Inc.
PO Box 540
Denver, Colorado 80201, USA
+1 (800) 604-2566
[email protected]

Follow Us




Quick Links

Login to GreatHorn Dashboard

Customer Support

Product

Product Overview

Product Plans

Integrations

Solutions

By Platform:

Microsoft 365

Google Workspace

By Attack Type:

Executive Impersonations

Supply Chain Impersonations

Internal Employee Impersonations

External Impersonations

Internal Spearphishing

Payment Fraud

Credential Theft

Malicious Payloads

Malicious and Suspicious URLs

Resources

Resource Center

Blog

Partners

Channel Partners

Technology Integration & Alliance Partners

MSP/MSSPs

Register a Deal

Company

About GreatHorn

Leadership

Trust & Security

Media Coverage

Press Releases

Contact Us

Careers

© 2023 GreatHorn, Inc. All rights reserved.    |   Privacy Policy   |   Terms and Conditions
AICPA SOC 2 - Type II CertifiedAICPA SOC 3 CertifiedCSA- Cloud Security Alliance