The Inky Difference
Zero Day Phishing Attacks

Prevent Zero Day Phishing Attacks 

Inky’s advanced machine learning, computer vision and artificial intelligence detect phishing attacks that are not yet identified by other systems.

Many anti-phishing products rely on a database of signatures, rendering them defenseless against a phishing attack until a signature is developed and deployed. Inky is different.

Each month, 1.5 million new phishing sites are created.  This means that standard phishing protections like URL blacklists, are of limited utility since the number of URLs to be checked grows so rapidly.  The length of time that it takes for a signature to be released for a piece of malware depends on its complexity,  but typically takes 24-48 hours.  Since the first victim of a phishing attack falls for it within 82 seconds, this is far too long to protect the first victims of a new phishing attack.  Inky provides protection against zero-day phishing attacks while waiting for signature-based systems to catch up.

Computer Vision

Inky uses computer vision to see emails “like a human does”.  This allows Inky to determine the intended branding of the email and verify that it’s not a forgery. Computer vision also allows Inky to detect what a human can’t: nearly imperceptible false email addresses and URLs, with similar but not exactly matching characters, fonts, and text. 

Deep Link Inspection

Malicious links are commonly used in phishing emails, and many anti-phishing products check against a list of known malicious domains when marking emails as benign or suspicious.  Inky takes protection a step further by simulating a user click on the link and inspecting the target page for indications of phishing. 

HTML Sanitization

HTML emails are designed to allow a greater degree of configurability and individuality than plain-text emails.  However, this also opens the door to malicious scripts being embedded in emails that run when a user reads it.  Inky protects against these attacks by blocking embedded scripts capable of performing malicious actions.

How Does Inky Identify Zero Day Phishing Attacks?

Microsoft Office Macros

Macros are a feature of Microsoft Office that allow users to automate repetitive tasks.  However, Office Macros are extremely powerful and, if allowed to execute, can install malware on a computer. Phishers will create malicious Office documents and attach them to a phishing email that convinces readers to open them and allow macros to run.

Malicious Links

Embedding links within emails is a convenient way for the sender to direct readers to their website to perform an action or receive more information.  Phishers create malicious websites that infect visitors’ computers with malware and write phishing emails that convince readers to click on a link to the malicious site.

Infected PDFs:

Adobe’s Acrobat Reader is notorious for being prone to vulnerabilities that can be exploited to run code on a computer. Phishers take advantage of this by creating PDFs designed to install malware and attaching these PDFs to phishing emails.  The emails will be crafted to convince readers to open the PDF, infecting their computer.

Embedded Code

HTML emails allow more individuality in emails by including scripts and style information that enable animations and other functionality.  Phishers will include malicious scripts in phishing emails that take advantage of the opportunity to run code on the reader’s computer to install malware.

Why is Inky’s Zero-Day Phishing Protection Superior to Conventional Email Solutions?

Inky catches attacks the first time that they happen.

Most phishing protection products use signatures of known attacks for protection, meaning that they are defenseless until an attack has been detected and a signature is built and deployed.  Inky’s approach is completely different, blocking attacks the first time with no signature needed because it seeks out abnormalities on multiple levels, from domain spoofing, brand forgery, text and character tricks, and even behavior profiling/machine learning.

Inky both protects and educates.  

Unlike anti-phishing products that mark suspicious emails with a generic warning message, Inky provides details about why an email was marked as suspicious.  This allows users to make an informed decision and provides effective user education by tying training to the real world.


Inky minimizes installation overhead.  

Most phishing protection solutions require software installation on client machines.  This involves software deployment and maintenance across the organization and limits the devices and email clients that users can protect.  Inky integrates directly with the server and can be completely installed in 1-2 hours with no client software installation needed.

Inky keeps admins in the loop.  

Inky includes an administrator dashboard that gives admins access and visibility to user phishing data.  When a zero-day attack is detected on the network, admins are notified and can take action to ensure that the organization is protected.


Want to See Inky in Action?

See Inky in action with a free scan of your inbox or get in touch to get a demo from one of our experts.

Inky® protects your organization from advanced phishing threats and other email based attacks.


Get Inky For Office 365

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.


Get Inky For Exchange

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.


Get Inky For G Suite

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.