Latest content

Men hand shaking in one of the potential business email compromise cases

10 real and famous cases of BEC (Business Email Compromise)

10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals aim to trick and persuade employees to take a specific action, such as making a wire transfer, providing funds to

Publicação
Email delivered at a mail box passing by dmarc

8 reasons to use DMARC in your business

Publicações
Security systems protecting email user with rua ruf dmarc

What are RUA and RUF in DMARC?

Publicações

Browse all articles

Woman looking at photo threatens hacker in a sextortion scheme

Sextortion scam demands USD 2000 to not “ruin your life”

Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand

Publicação
Anti phishing solution blocking email attacks in the city

Gatefy: anti-spam and anti-phishing solution for your business

Gatefy: anti-spam and anti-phishing solution for your business If your company is looking for an anti-spam and anti-phishing solution, Gatefy will solve your problem. Gatefy Email Security (GES) is a

Publicação
Spear phishing white paper cover

Spear Phishing

Go back to gatefy.com EMAIL THREAT Spear Phishing Spear phishing is a targeted fraud. That is, criminals focus their attacks on a specific group of people or companies. Therefore, it

Publicação
BEC Whitepaper cover

BEC (Business Email Compromise)

Go back to gatefy.com EMAIL THREAT BEC – Business Email Compromise BEC is an advanced fraud and one of the top threats to business and corporate email. The BEC is

Publicação
Magnifier finding a phishing email about amazon and ecommerces

Phishing email: your Amazon account is being suspended

Phishing email: your Amazon account is being suspended We’re going to talk about a phishing campaign that has been using Amazon’s name and brand. The threat has been detected and

Publicação
Famous cases of malware attacks victims

11 real and famous cases of malware attacks

11 real and famous cases of malware attacks Many cases of famous hacker attacks use malware at some point. For example, first, the cybercriminal can send you a phishing email.

Publicação

Main categories

Browse by category

Men hand shaking in one of the potential business email compromise cases

10 real and famous cases of BEC (Business Email Compromise)

10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals

Publicação
Email delivered at a mail box passing by dmarc

8 reasons to use DMARC in your business

8 reasons to use DMARC in your business A major cybersecurity problem is: hackers are always looking for new approaches and ways to abuse company brands and domains to trick

Publicação
Man sitting on a mail server

What is mail server?

What is mail server? We can say that an email server (or mail server) is your digital postal service. It’s a machine or application responsible for handling messages. In other

Publicação
Security systems protecting email user with rua ruf dmarc

What are RUA and RUF in DMARC?

What are RUA and RUF in DMARC? DMARC (Domain-based Message Authentication Reporting & Conformance) is an email validation and authentication system used to detect fraud, such as phishing and impersonation,

Publicação
Woman searching for famous social engineering attacks

10 real and famous cases of social engineering attacks

10 real and famous cases of social engineering attacks Social engineering is the tactic behind some of the most famous hacker attacks. It’s a method based on research and persuasion

Publicação
Woman looking at photo threatens hacker in a sextortion scheme

Sextortion scam demands USD 2000 to not “ruin your life”

Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand

Publicação

Downloadable materials

Access and Identity Control

How Hackers Exploit Emails

How to prevent e-mail spoofing with DMARC