Blog
A threat actor is targeting Certified Public Accountant (CPA) firms by posing as a doctor who’s in need of professional tax services.
Read moreIn the spring of 2020, we introduced a major advancement of our platform – Zix Secure Cloud. Zix Secure Cloud is a platform designed with your business in mind.
Read more30k orgs in the US have suffered a compromise as the result of a threat actor’s campaign to target Microsoft’s Exchange Server software.
Read moreIn mid-December, Zix | AppRiver shared some advice on how organizations could strengthen their digital defenses in the wake of the SolarWinds
Read moreIn 2020, we saw firsthand how quickly threat actors can evolve to leverage rapidly changing local and world events. The pandemic and the 2020 U.S.
Read moreIn a previous post, Zix | AppRiver discussed how those responsible for the SolarWinds attack had abused tokens and certificates as part of their infection chain. The malicious actors went on to abuse those same types of assets in additional campaigns targeting other entities.
Read moreAuthentication Certificate Compromised On January 12, 2021 Mimecast issued a statement on their blog indicating that sophisticated malicious actors had compromised an authentication certificate between a set of their services and Microsoft 365 web services. The impact and corresponding
Read moreAmidst another year inundated with data breaches it can be dizzying to even keep track of those that may impact you. It is important to remember that threat actors are indeed keeping track.
Read moreZix | AppRiver is advising organizations to protect themselves in the wake of the SolarWinds supply chain attack.
Read moreEmail attackers are sending out fake package notifications from the United States Postal Service (USPS) in an attempt to distribute the Quasar RAT.
Read moreDigital attackers are exploiting auto-forwarding rules to improve the success rate of their Business Email Compromise (BEC) scams.
Read moreEmail scammers are using fake Coronavirus 2019 (COVID-19) tax refund notifications in an attempt to harvest victims’ credentials.
Read more