News

Return to offices means new opportunities for phishing The move to home working provided new opportunities for phisherfolk, but as many people start to return to their offices the attackers are pivoting to exploit that too. A new report from email phishing protection specialist INKY shows attacks are capitalizing on vulnerability and the desire for accurate information about returning to the office in-person.
Read More
The Top 25 Most Phished Brands INKY processed 656,954,951 emails in 2020. From this data, they ranked the top 25 most-phished brands during 2020. In round numbers, that’s two-thirds of a billion. Within this pool, Inky found 4,874,096 phishing campaigns. Of those phishing campaigns, 591,293 of them were brand impersonations. Out of the brand-impersonation group, INKY found 40,903 unique campaigns.
Read More
INKY Closes 2020 with Triple Digit Growth in Enterprise & Mid-Market Customers Anti-Phishing Pioneer Launches into 2021 with Industry Leading Innovation and Expanding Market Share College Park, MD – February 3, 2021 – INKY Technology Corporation, a pioneer in next-gen email phishing protection, announced today the company closed 2020 with over 150% in enterprise and midmarket customer growth. “INKY’s 2020 exponential growth is a testament to the company’s dedication to innovation, extending the sales footprint with new partnerships and integrations, as well as exceptional leadership,” said Matt Gatto, Managing Director at Insight Partners. “INKY is well positioned to replace legacy Secure Web Gateway vendors and lead the anti-phishing market in 2021.”
Read More
INKY Technology Names Roger Kay as Vice President of Security Strategy College Park, MD – December 15, 2020 – INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced that Roger Kay, former Vice President of Client Computing at IDC, will be joining the leadership team as Vice President of Security Strategy to enhance the company’s product and market strategies, including competitive assessment, forecasting, and market positioning.
Read More
Phishing Attackers keep Hijacking Prestigious University Email Accounts To sneak Past Corporate Security The cybercriminal interest in hijacking university email domains is one of cybersecurity’s worst kept secrets and yet it’s become a problem that only seems to generate more bad news.
Read More
INKY Enhances Next-Gen Email Phishing Protection Solution with Account Takeover Protection College Park, MD – October 20, 2020 – INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced the addition of Account Takeover (ATO) Protection to the company’s INKY Phish Fence Platform. Email is an inherently trusted means of communicating for business, if cybercriminals compromise just one email account, they can gain trusted access to an organization's whole network.
Read More
INKY Technology Appoints Leigh Reichel as Chief Financial Officer COLLEGE PARK, Md., Oct. 2, 2020 /PRNewsCentre/ — INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced that Leigh Reichel, a seasoned industry leader with more than 30 years of financial management and executive leadership, has been appointed Chief Financial Officer (CFO).
Read More
Report: Phishing Campaign Uses Hidden Text to Bypass Email Security Source: www.healthitsecurity.com A new phishing campaign has been spotted in the wild using hidden text, or what’s known as zero font, to bypass email security controls and deliver malicious emails to the user, according to a recent report from Inky Technology.
Read More
Credential harvesting — How Zoom opened the phishing floodgates Video conferencing tech has been a lifeline for businesses, helping them sustain operations and communications amid the surreal events of 2020. But this sudden reliance was a vulnerability that some were ready to exploit.
Read More
Inky spots new phishing attack with clever tricks Inky has reported a new phishing attack designed to confuse Secure Email Gateways (SEG). The attack is using hidden text to stop the SEG rejecting the email as fraudulent. It is also taking advantage of the Unicode Soft Hyphen feature to hide the displayed text from the SEG engine. The result is that the email is delivered to the user, looks like a legitimate email and is likely to be successful at harvesting user credentials.
Read More