All posts by Cloudmark

The State of Mobile Messaging Security

Mobile Application-to-person (A2P) messaging accounted for 1.38 trillion mobile messages last year, according to Mobilesquared; this market continues to grow.  Now more than ever is the time to think about how to ensure deliverability in the A2P cloud message space and how to prevent brand erosion or declines in quality of service due to abuse. Tomorrow we […]

The Top 5 CEO Email Wire Fraud Attacks: Rising in Frequency, Increasing in Financial Losses

As an attack, the CEO email wire fraud attack couldn’t be simpler. There’s no malware to write and no malicious code or links to implant. It’s a text only email, plain and simple – but it’s the social engineering that makes it work. Due to its simplicity, these spoofing attacks are one of the fastest […]

Cloudmark’s Annual Global Threat Report for 2015

Cloudmark’s Annual Threat Report for 2015 is now available and covers the following topics: A look at how enterprises are trying to combat spear phishing and how well these attempts succeed or fail, according to a new survey of 300 companies How the Swizzor malware propagates by camouflaging itself to evade spam filters The risks for brands […]

Survey Reveals Spear Phishing as a Top Security Concern to Enterprises

In 13 years of protecting hundreds of millions of end users from email and mobile spam, Cloudmark has seen billions of malicious emails, giving the company an inside view of the threats that come from messaging environments. We’ve seen the rise of phishing emails and their effects. And more recently, in the past several years, […]

Using DNS for “Local” Threat Intelligence

In a session I attended at the RSA Conference in San Francisco, one of the panelists was asked a question in the Q&A section about detecting malware that stays entirely in memory, i.e. Avoiding detection by never writing itself to disk. The panelist’s answer was insightful; he stated that malware still needs to communicate with […]

Cloudmark’s 3Q 2014 Security Threat Report

This quarter we investigate knock-off designer goods pitched by way of Apple iMessage’s first major spam campaign, examine the curious patterns of sub-domains generated for by DNS resource exhaustion attack, discuss the popular Peter Pan attack, and more trends in Cloudmark’s Q3 2014 Security Threat Report. On-going since last quarter, iMessage has been hit with the […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.