Business Email Compromise

Entering a Wave of Cybercriminal Impostor Chaos the World has Never Seen

May 24, 2024 / in Blog / by Zafar Khan, RPost CEO

Armand in Scotland at Night.

Armand here, RPost’s Armadillo product evangelist, hailing this week from wet and rainy Scotland (it rained a lot this week!). I’m here at the Association of Corporate Counsel Europe annual conference, discussing cyber-risk and sharing step-by-step how cybercriminals are orchestrating their attacks. 

EvilProxy Saves US-Based Cybercriminals from Unemployment

May 03, 2024 / in Blog / by Zafar Khan, RPost CEO

GenAI is obsoleting an unlikely sector of American entrepreneurs.

Armand here, RPost’s product evangelist, writing from beautiful Charlotte. I’ve been discussing security and AI at the International Legal Technology Association conference along with some of my human RPost teammates, Gerlyn, Arianna, and Laura.

Cybercriminals are Using Gen AI to Scale Their Email Attacks

March 29, 2024 / in Blog / by Zafar Khan, RPost CEO

Cybercriminals can now subscribe to black-hat AI as easily as Netflix. 

Armand here again reporting for Tech Essentials. This week, I’m writing to you from…my mom’s basement. This is so that I can try and get in the mindset of a cybercriminal trying to leverage AI to perpetrate a sophisticated email scam.

Protect Against Human-Managed Attacks That Penetrate Both Your Security and of Your Email Recipients

September 22, 2023 / in Blog / by Zafar Khan, RPost CEO

Got a Billion-Dollar IT Budget? If Not, Read On…

Got a billion-dollar IT budget? Got the best Microsoft cybersecurity tools money can buy? Got teams and teams of IT staff who proactively monitor lights blinking on servers and charts on screens looking for cybercriminal activity within your network?

Empower Your Cybersecurity with RMail's Innovative Tools

July 28, 2023 / in Blog / by Zafar Khan, RPost CEO

Are you a routine kind of Guy or Gal?

[If you are a routine kind of person, stop reading here. If you consider yourself to be less bland, I challenge you to read to the end.]

Top Three FBI-Special-Agent Speaker Insights on BEC

May 05, 2023 / in Blog / by Zafar Khan, RPost CEO

We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).

Sophisticated Email Initiated Crime & How to Prevent Them With RMail PRE-Crime Services

February 10, 2023 / in Blog / by Zafar Khan, RPost CEO

You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.

80% of Organizations have Experienced Cybercriminal BEC Attacks Over the Last Year and they Start with Email Eavesdropping Activities

February 03, 2023 / in Blog / by Zafar Khan, RPost CEO

You may be barricaded inside the best of (fire)walls, but you could still be exposed by your recipients’ nostalgia for their memorable passwords. Joseph Heller, author of Catch 22, famously wrote that “just because you’re paranoid doesn’t mean they aren’t after you.” Many Generation Xers out there may recall that Kurt Cobain also used this […]

The Top Cybersecurity Trends of 2022

December 30, 2022 / in Blog / by Zafar Khan, RPost CEO

What were the top tech and e-security trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]

Alert on External Email When There Is an Actual Issue

October 21, 2022 / in Blog / by Zafar Khan, RPost CEO

Only RMail offers features that can foil BEC attacks without “cry wolf” email stamps. We’ve talked a lot about the hydra of BEC (business email compromise) attacks recently due to the increasing share of these types of attacks within the universe of cybercrime that employ multiple techniques to lure users into sending money to the […]