GreatHorn Blogs
Featured
Most Popular
More Blogs
Phishing Phails: When Cybercriminals Don’t Get It “Right”
At GreatHorn, we spend most of our time and effort on the most sophisticated email attacks that...
Phishing Attacks Trends Using ‘Vaccine’ Keyword
Nobody expects scruples from an email phishing attacker. So, it should come as no surprise that...
GreatHorn vs Proofpoint: A 3rd Party Comparison
Cybercriminals are always sharpening and improving their malicious techniques. And organizations...
Newly Identified Zoom Impersonation Phishing Campaigns: Targeting Users in the EU
People are used to getting emails from well-known technology service providers: the Amazon order...
How Email Security Can Align to the MITRE ATT&CK Framework
In our previous post, What is the MITRE ATT&CK Matrix, we explained what the matrix is and how...
New Phishing Attack Identified: Malformed URL Prefixes
The offer in your email inbox from "amozon.com"? Most people probably know not to click on that....