Some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attackers use it? Join INKY experts as we share phishing emails caught in the wild and explain both the why and how of hidden text and zero font.
RecordedAug 21 202027 mins
Your place is confirmed, we'll send you email reminders
Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.
INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.
During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
Chances are your business relies heavily on email as the primary tool used for communicating, meeting setting, and sharing files internally and externally. The challenge is that fraudsters know this too, and perpetuate phishing and attachment attacks every single day. Most businesses are using some form of email security, but with today’s cybercrime climate, it is not enough.
Register for this webinar to learn:
•How to ensure business continuity with Intelligent Phishing Security powered by machine learning and AI
•Steps to supplement the core email defense to effectively block BEC, brand forgery, domain spoofing and more.
Register Now
Dave Baggett, CEO, INKY and Roger Kay VP of Security Strategy
Nearly 90% of all data breaches and threats are a result of human error. When it comes to phishing emails, you are only as strong as your weakest link. Through just one compromised email account, cybercriminals can gain trusted access to an organization's whole network. The only safe way to stop zero day and BEC attacks is to stop them before they get to end users.
INKY is the only vendor in the cybersecurity industry that is powered by machine learning and computer vision techniques to create individual sender profiles and block BEC attacks for users and most importantly, third-parties.
During this webcast, Dave Baggett, CEO of INKY, and Roger Kay, VP of Security Strategy, will show the risk of human error in phishing attacks and how INKY's technology is preventing these malicious attacks from happening.
Key Takeaways:
• How are phishing attacks getting passed the secure email gateways?
• How can you ensure business continuity with Intelligent Phishing Security powered by machine learning and AI?
• what steps can a company take to supplement the core email defense to effectively block BEC, brand forgery, zero-day and more?
Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?
Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.
Join this webinar to learn how with INKY’s Phish Fence you can:
Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats
Fully integrate into your existing Office 365 email deployment
Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through
How are you maintaining email security in google workspace, formally gsuite?
Google has enabled rudimentary phishing protection in Gmail, letting customers specify their own Sender Policy Framework (SPF) records and cryptographically mark e-mail with DomainKeys Identified Mail (DKIM). But the effectiveness of such outbound protection relies on customers implementing its elements, which mostly benefit recipients of the organization’s email.
On the inbound side, Google asks administrators to set up a Domain-based Message Authentication, Reporting & Conformance (DMARC) record to check either the SPF record or the DKIM signature on the incoming mail. If either passes, the email is usually let through.
…And that’s pretty much it for Gmail’s anti-phishing technology.
INKY Phish Fence provides an innovative new approach to protecting email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.
Join this webinar to see how layering INKY Phish Fence on top of Gmail will catch a lot more phish.
Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?
Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.
Join this webinar to learn how with INKY’s Phish Fence you can:
Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats
Fully integrate into your existing Office 365 email deployment
Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through
Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.
INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.
During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.
INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.
During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
The Next Generation of Email Protection
INKY is an award-winning cloud-based email protection software. It blocks spam, malware, and most importantly — it protects businesses from phishing attacks like no other email security solution can.
Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are the two biggest problems facing security teams in 2020. The phishing emails that are sent as part of an Account Takeover Attack (ATO) come in many forms with new schemes being developed every day. Keeping your supply chain trained to spot these evolving schemes is nearly impossible. Thankfully, INKY is combating account takeover for you with new methods.
During this webcast, Dave Baggett, CEO of INKY Technology, will show examples of ATO and highlight INKY’s newest capabilities to combat them.
Key Takeaways:
• What are the latest phishing threats facing enterprises?
• How exactly are these attacks getting passed the secure email gateways?
• What are the newest best practices to prevent these attacks?
Chances are your business relies heavily on email as the primary tool used for communicating, meeting setting, and sharing files internally and externally. The challenge is that fraudsters know this too, and perpetuate phishing and attachment attacks every single day. Most businesses are using some form of email security, but with today’s cybercrime climate, it is not enough.
Register for this webinar to learn:
•How to ensure business continuity with Intelligent Phishing Security powered by machine learning and AI
•Steps to supplement the core email defense to effectively block BEC, brand forgery, domain spoofing and more.
Register Now
Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
Some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attackers use it? Join INKY experts as we share phishing emails caught in the wild and explain both the why and how of hidden text and zero font.
Are you confident that your users can successfully identify and thwart a phishing attempt? To ensure business continuity in an already complex digital work environment, join INKY experts to dive into the expert traps cybercriminals are perpetuating currently. Learn how to empower your end-users to identify and stop cyber criminal’s advanced attacks that often bypass legacy email security tools. Recent research shows that 70.8% of organizations have less than 1 security staff member to every 100, with 49% of those reporting 1 security team member to 500 staff members.* That leaves security staff stretched thin to combat phishing attempts aimed at (mostly) innocent employee actions.
Join this webinar to:
- Gain an understanding of tactics cybercriminals are using to trick and lure innocent users, including malicious links, attachment clicking, embedded code
- Learn how to implement a comprehensive security program that leverages machine learning to drive better user behaviors in end users
- Leverage INKY’s proprietary Computer Vision to to identify and stop phishing attempts with one look
Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool both human recipients and mail protection software. Sophisticated bad actors bring extensive knowledge of how SEGs and mail readers work to craft scams that fool both the humans and the machines. Join this webcast as we dive into some of the evolving tactics currently being used to uncover what you need to be looking for to keep phishing emails out.
Dave Baggett, CEO, INKY and Karim Hijazi, CEO, Prevailion and Moderated by Ron Gula, President of Gula Tech Adventures
In the wake of the pandemic sweeping the globe, cyber attackers are evolving and increasing their attacks against a newly remote workforce. These criminals are looking for a way into organizations by preying on teams already stretched thin and unsuspecting employees accustomed to the protection of their organization’s security infrastructure.
Join INKY Founder and CEO, Dave Baggett, and Founder and CEO, Karim Hijazi, Prevailion as they explore today’s threats and tips to strengthen your security today.
Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
Join us every month as email security experts discuss hot topics in phishing scams and tactics and preventative measures to avoid them.
This week:
The cyber landscape has rapidly changed this past week, criminals are taking advantage of the shift to your employees working remotely. Please join and listen in as INKY experts discuss the latest phishing attacks in the wake of COVID-19, and what you need to do now to adapt.
Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?
Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.
Join this webinar to learn how with INKY’s Phish Fence you can:
Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats
Fully integrate into your existing Office 365 email deployment
Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through
We started INKY because we believe in email and wanted to protect it. INKY is changing the industry with mail protection powered by unique computer vision, artificial intelligence, and machine learning. At INKY we set out to give organizations the ability to “see” each email much like a human does, to block phishing attacks that get through every other system.
Phish Friday: Hidden Text and Zero FontDave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]26 mins