10 real and famous cases of BEC (Business Email Compromise)

Men hand shaking in one of the potential business email compromise cases

10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals aim to trick and persuade employees to take a specific action, such as making a wire transfer, providing funds to pay for an allegedly new […]

8 reasons to use DMARC in your business

Email delivered at a mail box passing by dmarc

8 reasons to use DMARC in your business A major cybersecurity problem is: hackers are always looking for new approaches and ways to abuse company brands and domains to trick employees, customers, and partners, mainly via malicious emails. It’s in this context that DMARC becomes an indispensable solution for organizations. In this article, we’ll explain […]

What is mail server?

Man sitting on a mail server

What is mail server? We can say that an email server (or mail server) is your digital postal service. It’s a machine or application responsible for handling messages. In other words, an email server receives and delivers emails, this is its function. So, when you send an email, your message usually goes through a series […]

What are RUA and RUF in DMARC?

Security systems protecting email user with rua ruf dmarc

What are RUA and RUF in DMARC? DMARC (Domain-based Message Authentication Reporting & Conformance) is an email validation and authentication system used to detect fraud, such as phishing and impersonation, and improve email deliverability. DMARC works by protecting your domain and providing visibility over it through two reports: aggregated reports (RUA) and forensic reports (RUF). […]

10 real and famous cases of social engineering attacks

Woman searching for famous social engineering attacks

10 real and famous cases of social engineering attacks Social engineering is the tactic behind some of the most famous hacker attacks. It’s a method based on research and persuasion that is usually at the root of spam, phishing, and spear phishing scams, which are spread by email. The purpose of social engineering attacks is, […]

Sextortion scam demands USD 2000 to not “ruin your life”

Woman looking at photo threatens hacker in a sextortion scheme

Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand how this type of threat works, check out the example of a sextortion scam that was detected by Gatefy’s email security solution. In the scam, […]

Gatefy: anti-spam and anti-phishing solution for your business

Anti phishing solution blocking email attacks in the city

Gatefy: anti-spam and anti-phishing solution for your business If your company is looking for an anti-spam and anti-phishing solution, Gatefy will solve your problem. Gatefy Email Security (GES) is a solution that protects your company against different types of email threats, such as spam, phishing, ransomware, virus, BEC (Business Email Compromise), and social engineering. GES […]

Phishing email: your Amazon account is being suspended

Magnifier finding a phishing email about amazon and ecommerces

Phishing email: your Amazon account is being suspended We’re going to talk about a phishing campaign that has been using Amazon’s name and brand. The threat has been detected and blocked by Gatefy’s email security solution. As it uses the Amazon logo and the same branding, many users may be mistaken. But beware: as we […]

11 real and famous cases of malware attacks

Famous cases of malware attacks victims

11 real and famous cases of malware attacks Many cases of famous hacker attacks use malware at some point. For example, first, the cybercriminal can send you a phishing email. No attachment. No links. Text only. After he gains your trust, in a second moment, he can send you a malicious attachment, that is, malware […]

10 LGPD principles that guide personal data processing

Law representing LGPD.

10 LGPD principles that guide personal data processing The principles of the LGPD (Brazilian General Data Protection Law) are the concepts and beliefs that support the law. It’s based on them that the law was created. Therefore, companies must also base their actions on the LGPD’s principles when processing personal data. That’s why it’s so important […]