AppRiver Update

Cybersecurity News and Threat Intelligence for Business

April Fools! A Blooper Reel of Recent Digital Atta…

on April 01, 2019 | by David Bisson | cybersecurity, email security

Nowadays, digital attacks are a serious concern for organizations. One need only look to the growing costs of digital crime to understand why. IBM’s 2018 Cost of a Data Breach Study found that the cost of a data breach had increased 6.4 percent over the previous year to $3.86 million. Meanwhile, Cyb ... read more

Mailbox Scams Ramping Up

on March 21, 2019 | by Bear Huddleston | email security

Online mailbox scams aiming to trick users to hand over their mailbox to a scammer have been ramping lately. The scam begins with a deceptive email to the end user claiming suspicious activity has been observed in their email account or that their inbox is full and needs attention. The email also co ... read more

GandCrab Ransomware Takes Aim At Your Inbox

on February 27, 2019 | by Troy Gill | advanced email security, email security, gandcrab

Over the past several days AppRiver security specialists have been seeing early morning Ransomware campaigns targeting users. The ransomware itself belongs to the GandCrab family and has been the most frequently distributed of its kind over the past year. And like most ransomware, it has the power t ... read more

The Ongoing Emotet Campaigns

on February 19, 2019 | by Bear Huddleston | emotet, banking trojan, email security

Security specialists at AppRiver have been combating the nonstop and ever-changing Emotet campaigns. The more you know and understand about Emotet campaigns, the better chance you'll have at staying protected. Knowledge of threats, coupled with best practices of safeguarding your information online ... read more

WANTED: Your Office 365 Credentials

on December 18, 2018 | by Troy Gill | phishing, Outlook phishing, advanced email security, email security

Here we go again - attackers are going "phishing" in search of user's Office 365 credentials. In the past we have seen this sort of activity ramp up dramatically at many different points in time, and it is usually followed by a corresponding increase in attacks being launched from the compromised ... read more