Hi [[ session.user.profile.firstName ]]

Phish Friday: COVID-19 Phishing Scam (Part 2)

Phishers are swiftly adapting their tactics to target a now remote workforce under the guise of COVID-19 related emails.
Recorded May 15 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
Presentation preview: Phish Friday: COVID-19 Phishing Scam (Part 2)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Microsoft Office 365 Phishing Protection Dec 17 2020 6:00 pm UTC 35 mins
    Matthew Sywulak
    Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?

    Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.

    Join this webinar to learn how with INKY’s Phish Fence you can:

    Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats

    Fully integrate into your existing Office 365 email deployment

    Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through

    Register Now
  • Product Demo: Mobile Phishing Protection Dec 8 2020 6:00 pm UTC 30 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • Product Demo: Mobile Phishing Protection Recorded: Nov 18 2020 31 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • INKY Anti Phishing Demo Recorded: Oct 28 2020 30 mins
    Matthew Sywulak
    Watch this exclusive demo.

    The Next Generation of Email Protection
    INKY is an award-winning cloud-based email protection software. It blocks spam, malware, and most importantly — it protects businesses from phishing attacks like no other email security solution can.
  • Phish Friday: Battling Account Takeover with Stylometry Recorded: Oct 23 2020 28 mins
    Dave Baggett, CEO, INKY
    Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are the two biggest problems facing security teams in 2020. The phishing emails that are sent as part of an Account Takeover Attack (ATO) come in many forms with new schemes being developed every day. Keeping your supply chain trained to spot these evolving schemes is nearly impossible. Thankfully, INKY is combating account takeover for you with new methods.

    During this webcast, Dave Baggett, CEO of INKY Technology, will show examples of ATO and highlight INKY’s newest capabilities to combat them.

    Key Takeaways:

    • What are the latest phishing threats facing enterprises?
    • How exactly are these attacks getting passed the secure email gateways?
    • What are the newest best practices to prevent these attacks?
  • Supplementing your Email Defense with an Intelligent Phishing Solution Recorded: Sep 16 2020 48 mins
    Scott Haynes, Enterprise Solutions Engineer, INKY
    Chances are your business relies heavily on email as the primary tool used for communicating, meeting setting, and sharing files internally and externally. The challenge is that fraudsters know this too, and perpetuate phishing and attachment attacks every single day. Most businesses are using some form of email security, but with today’s cybercrime climate, it is not enough.
    Register for this webinar to learn:
    •How to ensure business continuity with Intelligent Phishing Security powered by machine learning and AI
    •Steps to supplement the core email defense to effectively block BEC, brand forgery, domain spoofing and more.
    Register Now
  • Phish Friday: Hidden Text and Zero Font Recorded: Aug 21 2020 27 mins
    Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
    Some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attackers use it? Join INKY experts as we share phishing emails caught in the wild and explain both the why and how of hidden text and zero font.
  • How to Build a People First Phishing Prevention Defense Recorded: Jun 30 2020 22 mins
    Vin Hardick, Sales Engineer, INKY
    Are you confident that your users can successfully identify and thwart a phishing attempt? To ensure business continuity in an already complex digital work environment, join INKY experts to dive into the expert traps cybercriminals are perpetuating currently. Learn how to empower your end-users to identify and stop cyber criminal’s advanced attacks that often bypass legacy email security tools. Recent research shows that 70.8% of organizations have less than 1 security staff member to every 100, with 49% of those reporting 1 security team member to 500 staff members.* That leaves security staff stretched thin to combat phishing attempts aimed at (mostly) innocent employee actions.

    Join this webinar to:

    - Gain an understanding of tactics cybercriminals are using to trick and lure innocent users, including malicious links, attachment clicking, embedded code

    - Learn how to implement a comprehensive security program that leverages machine learning to drive better user behaviors in end users

    - Leverage INKY’s proprietary Computer Vision to to identify and stop phishing attempts with one look

    - How to automate phishing identification
  • Phish Friday: Text Direction Deception Recorded: Jun 19 2020 19 mins
    Dave Baggett, CEO, INKY
    Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool both human recipients and mail protection software. Sophisticated bad actors bring extensive knowledge of how SEGs and mail readers work to craft scams that fool both the humans and the machines. Join this webcast as we dive into some of the evolving tactics currently being used to uncover what you need to be looking for to keep phishing emails out.
  • Phish Friday: COVID-19 Phishing Scam (Part 2) Recorded: May 15 2020 28 mins
    Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
    Phishers are swiftly adapting their tactics to target a now remote workforce under the guise of COVID-19 related emails.
  • Strengthening Your Security Posture During a Pandemic Recorded: Apr 29 2020 60 mins
    Dave Baggett, CEO, INKY and Karim Hijazi, CEO, Prevailion and Moderated by Ron Gula, President of Gula Tech Adventures
    In the wake of the pandemic sweeping the globe, cyber attackers are evolving and increasing their attacks against a newly remote workforce. These criminals are looking for a way into organizations by preying on teams already stretched thin and unsuspecting employees accustomed to the protection of their organization’s security infrastructure.

    Join INKY Founder and CEO, Dave Baggett, and Founder and CEO, Karim Hijazi, Prevailion as they explore today’s threats and tips to strengthen your security today.
  • Phish Friday: COVID-19 Phishing Scams (Part 1) Recorded: Apr 3 2020 25 mins
    Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
    Join us every month as email security experts discuss hot topics in phishing scams and tactics and preventative measures to avoid them.

    This week:

    The cyber landscape has rapidly changed this past week, criminals are taking advantage of the shift to your employees working remotely. Please join and listen in as INKY experts discuss the latest phishing attacks in the wake of COVID-19, and what you need to do now to adapt.
  • Tackling Phishing in Microsoft Office 365 with INKY Recorded: Apr 1 2020 36 mins
    Matthew Sywulak
    Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?

    Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.

    Join this webinar to learn how with INKY’s Phish Fence you can:

    Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats

    Fully integrate into your existing Office 365 email deployment

    Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through

    Register Now
Improving email security
We started INKY because we believe in email and wanted to protect it. INKY is changing the industry with mail protection powered by unique computer vision, artificial intelligence, and machine learning. At INKY we set out to give organizations the ability to “see” each email much like a human does, to block phishing attacks that get through every other system.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Phish Friday: COVID-19 Phishing Scam (Part 2)
  • Live at: May 15 2020 5:00 pm
  • Presented by: Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
  • From:
Your email has been sent.
or close