Nifty.com Used as Phishing Infrastructure: How Raven Detected Abuse of Trusted Infrastructure
Between April- May 2025, Raven uncovered a sophisticated phishing campaign that didn’t spoof a trust..
Threat Landscape
Best Practices for Securing Group Email IDs in Google Workspace & M365
Case Study
May 7, 2025 · 5 min read
The Silent Threat: Why SEGs, Google, Microsoft Struggle to Stop Executive Impersonation
May 5, 2025 · 5 min read
How Sophos newsletter forums were gamed to distribute malware to its clients
May 2, 2025 · 5 min read
✨ AI Model Launch: Context-Aware Sender Impersonation Detection
Press Release
Sep 29, 2024 · 5 min read
Attack Demo #3: Github Abuse - Delivering Malware Using Trusted Platforms
Demo
Sep 27, 2024 · 7 min read
Government & Regulatory Impersonation: An Overlooked Threat Vector in Email Security
Sep 24, 2024 · 7 min read
What is Fileless Malware & How to Detect Them
Sep 19, 2024 · 5 min read
Attack Demo #2: System Take Over Using a Single Mail
Sep 12, 2024 · 3 min read
CEO Impersonation on WhatsApp & the Role of Email enabling Cross-Platform attacks
Sep 9, 2024 · 7 min read
Go live in minutes