Business Email Compromise Bec

Real Estate Wire Fraud Scam: How RAPTOR AI Spotted Global Cyber Recon

April 03, 2026 / in Blog / by Zafar Khan, RPost CEO

A Texas Closing, a Gmail Open, and a Big Red Flag…

Rocky the Raptor here, RPost’s cybersecurity product evangelist. Let me tell you the story of a real estate transaction that could have possibly ended in BEC/wire or escrow fraud. Though I’ve got eyes sharper than a closing attorney reviewing a title commitment, I admit this one almost slipped through the cracks!

From Defense to Offense: The Rise of Cybersecurity PRE-Crime in the AI Era

March 27, 2026 / in Blog / by Zafar Khan, RPost CEO

Cybersecurity shifts from reaction to preemption

Rocky the Raptor here, RPost’s cybersecurity product evangelist. Let’s talk about something big - not incremental, not evolutionary, but a fundamental shift in cybersecurity. 

Why Third-Party Risk Management in M&A Is the Silent Valuation Killer

March 13, 2026 / in Blog / by Zafar Khan, RPost CEO

A Raptor’s Guide to Protecting Your Valuation.

Rocky the Raptor here, RPost’s cybersecurity product evangelist, swooping in with a topic that doesn’t always get the spotlight it deserves until it’s too late: Third-party risk… and how it quietly affects your company’s valuation in an acquisition.

The *Pace* of AI Change Is the Real Disruption (More than AI Itself)

January 05, 2026 / in Blog / by Zafar Khan, RPost CEO

AI is evolving (sometimes daily) and nowhere is this more dangerous than in cybersecurity.

Rocky the Raptor here, RPost’s cybersecurity product evangelist, with some early 2026 insights.

Should AI Security Protect the Network or the Content Itself?

December 26, 2025 / in Blog / by Zafar Khan, RPost CEO

Debate at the Edge of the Network

A back-and-forth conversation between Rocky the Raptor (Cybersecurity Evangelist) and Armand the Armadillo (Workflow Automation Evangelist) at RPost

DNS Swapping Attacks: How URLs Turn Malicious After Email Delivery

December 19, 2025 / in Blog / by Zafar Khan, RPost CEO

Shoe Sizes Don’t Change When You Age. Where URLs Resolve Can Change Even When Aged.

Rocky the raptor here, RPost’s cybersecurity product evangelist. I was in the ski shop the other day, doing what every raptor does around the holidays: soaking in the gear aisle and pretending I need new equipment 😊 I spotted a shiny new ski boot buckle gadget. Sleek. Clever. Possibly unnecessary.

Timing Is Everything: It's Not All About Cyber Threats

October 17, 2025 / in Blog / by Zafar Khan, RPost CEO

Preempt Cybercrime Before Cybercriminals (Threats) Strike

Rocky the Raptor here, RPost’s cybersecurity product evangelist, ready to tell you a story about why timing is everything -- especially when it comes to the digital world.

Protect Your Inbox from BEC & Ransomware with RAPTOR AI Beyond-Endpoint Security

September 19, 2025 / in Blog / by Zafar Khan, RPost CEO

BLUF on RAPTOR AI for Cybersecurity Specialists

Hey there, Rocky the Raptor here, RPost's cybersecurity product evangelist. I’m here to speak about a BLUF (hint, not a cliff).

Detect Advanced Man-in-the-Middle Attacks with RAPTOR AI

September 11, 2025 / in Blog / by Zafar Khan, RPost CEO

Classic Man-in-the-Middle Has Evolved to Man in the Inbox…

Rocky the Raptor here, your sharp-clawed cybersecurity evangelist, here to rip apart some old myths about Man-in-the-Middle (MITM) attacks - those sneaky tactics most people think they understand, but few realize just how far they’ve evolved.

Business Email Compromise (BEC) – Industry Examples

April 14, 2016 / in Blog / by Zafar Khan, RPost CEO

Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization.