Email Eavesdropping

Prevent, Detect and Disarm BEC-Initiated Wire Fraud (Mis-Payment) Attacks

May 19, 2023 / in Blog / by Zafar Khan, RPost CEO

After reading the recent FBI report on the state of email related cybercrime in 2022, one statistic popped out at me, when correlating different parts of the report related to Business Email Compromise and Ransomware. 

Top Three FBI-Special-Agent Speaker Insights on BEC

May 05, 2023 / in Blog / by Zafar Khan, RPost CEO

We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).

Email Eavesdropping Detection Service Can See Where in the World One’s Email is Being Routed

February 24, 2023 / in Blog / by Zafar Khan, RPost CEO

Guess which of these conspiracy theories is actually true. This article is the fourth and final of a series devoted to Email Eavesdropping™ threat hunting.

RMail’s Aggregate Eavesdropping Heartbeat Monitor Offers a Daily Snapshot of Email Eavesdropping Risks for MSPs or IT Admins

February 17, 2023 / in Blog / by Zafar Khan, RPost CEO

RMail’s heartbeat monitor is like having your own email secret service patrolling your inbox. Previously on Tech Essentials, we let you live through, in chilling detail, a sophisticated email scam that originated with an email exchange that was eavesdropped on by a cybercriminal gang. In retrospect, the most sophisticated aspect of the scam was the […]

Sophisticated Email Initiated Crime & How to Prevent Them With RMail PRE-Crime Services

February 10, 2023 / in Blog / by Zafar Khan, RPost CEO

You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.

80% of Organizations have Experienced Cybercriminal BEC Attacks Over the Last Year and they Start with Email Eavesdropping Activities

February 03, 2023 / in Blog / by Zafar Khan, RPost CEO

You may be barricaded inside the best of (fire)walls, but you could still be exposed by your recipients’ nostalgia for their memorable passwords. Joseph Heller, author of Catch 22, famously wrote that “just because you’re paranoid doesn’t mean they aren’t after you.” Many Generation Xers out there may recall that Kurt Cobain also used this […]

Save Your Team Valuable Time by Leveraging Email Signatures

January 06, 2023 / in Blog / by Zafar Khan, RPost CEO

RMail’s security features connect elegantly inside your existing email programs and business systems. By now, you’ve heard “Happy New Year” perhaps hundreds, maybe thousands of times. (We’re as guilty of this as anyone with some of our recent posts and emails 😉).

Top 5 Insurance Tech Issues & Insights From AppliedNet at Optimize!22

November 09, 2022 / in Blog / by Zafar Khan, RPost CEO

From AppliedNet, The Top 5 InsurTech Peer Insights (We Took Notes For You) To extend the premise of today’s in-person user conferences – learning from peers – we’ve prepared a list of the five most significant issues or insights that we heard from insurance agents’ and brokers’ conference participants in October.

Top 5 Legal Security Issues & Insights From ILTA LegalSEC at Optimize!22

October 19, 2022 / in Blog / by Zafar Khan, RPost CEO

From ILTA LegalSEC, The Top 5 Peer Insights (We Took Notes) To extend the premise of ILTA (the International Legal Technology Association) – learning from peers – we’ve prepared a list of the five most significant issues or insights that we heard from international legal technology security (LegalSEC) conference participants.

Business Email Compromise Attacks in Many Ways

October 07, 2022 / in Blog / by Zafar Khan, RPost CEO

Business Email Compromise Cybercriminal Lures Attack in Many Ways, Like a Hydra Monster with Many Heads. Each Attack Vector Needs a Defense. Enter RMail. Before we start today’s article, we’d like to ensure you have heard about – and been invited to – RPost’s Optimize!2022 global e-security and eSign user conference (click here to read […]