INKY's Behavioral Email Security PlatformBlock threats, prevent data leaks, and coach users to make smart decisions.Explore the platform.
INKY's Behavioral Email Security PlatformBlock threats, prevent data leaks, and coach users to make smart decisions.Explore the platform.
One of the most pernicious forms of phishing involves account takeover. In these attacks, bad actor harvests, guesses, or brute-forces the password for an email account, and then uses this account to impersonate a person or brand often with devastating results.
Every phishing email has to come from some source email account: some mail server has to initiate an SMTP session with one or more
other mail servers to cause the phishing email to get delivered to its intended victim. So the phisher needs some mail server to send his evil emails.
Where can he get this mail server? Broadly, he has three options: he can set up his own mail server, he can use a free shared mail infrastructure like Gmail, or he can take over someone’s legitimate account on their organization’s mail server. At INKY we see vast amounts of all three kinds, but the latter ATO type is in many ways the nastiest, for several reasons.
What's inside this guide:
Download your free copy.
INKY is a cloud-based email security solution that blocks spam, malware, and — most importantly — phishing attacks. Utilizing computer vision, artificial intelligence, and machine learning INKY catches everything. Driven, curious, mobile, and growing smarter by the subject line, INKY adds a thin—but powerful— layer of protection like no other.