{"id":194,"date":"2022-11-08T07:55:01","date_gmt":"2022-11-08T13:55:01","guid":{"rendered":"https:\/\/tekweis.com\/?p=194"},"modified":"2022-11-08T08:02:47","modified_gmt":"2022-11-08T14:02:47","slug":"phishing-emails","status":"publish","type":"post","link":"https:\/\/tekweis.com\/index.php\/2022\/11\/08\/phishing-emails\/","title":{"rendered":"Phishing emails"},"content":{"rendered":"\n<p>It is amazing how phishing emails are becoming more sophisticated. We have recently added a product called <strong><a href=\"https:\/\/www.slashnext.com\/email-protection\/\" data-type=\"URL\" data-id=\"https:\/\/www.slashnext.com\/email-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">SlashNext<\/a><\/strong> to help protect our environment from phishing emails. It has been doing a fantastic job of catching emails that passed every other detection method. Below are six samples of the emails captured and blocked from going to the recipients.<\/p>\n\n\n\n<p class=\"has-white-background-color has-background\"><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.slashnext.com\/email-protection\/\" data-type=\"URL\" data-id=\"https:\/\/www.slashnext.com\/email-protection\/\" target=\"_blank\">SlashNext <\/a><\/strong>uses a method of analyzing the links within an email (Or website if you have browser protection also). Thus, this provides protection that most anti-spam and email protection systems, miss.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"649\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16.jpg\" alt=\"\" class=\"wp-image-200\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16.jpg 1280w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16-300x152.jpg 300w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16-1024x519.jpg 1024w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16-768x389.jpg 768w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-16-660x335.jpg 660w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"513\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-19.jpg\" alt=\"\" class=\"wp-image-199\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-19.jpg 634w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-19-300x243.jpg 300w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"627\" height=\"367\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-20.jpg\" alt=\"\" class=\"wp-image-198\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-20.jpg 627w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-20-300x176.jpg 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"614\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot.jpg\" alt=\"\" class=\"wp-image-197\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot.jpg 1280w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-300x144.jpg 300w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-1024x491.jpg 1024w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-768x368.jpg 768w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-660x317.jpg 660w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"649\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21.jpg\" alt=\"\" class=\"wp-image-196\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21.jpg 1280w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21-300x152.jpg 300w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21-1024x519.jpg 1024w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21-768x389.jpg 768w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-21-660x335.jpg 660w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"649\" src=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5.jpg\" alt=\"\" class=\"wp-image-195\" srcset=\"https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5.jpg 1280w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5-300x152.jpg 300w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5-1024x519.jpg 1024w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5-768x389.jpg 768w, https:\/\/tekweis.com\/wp-content\/uploads\/2022\/11\/Malicious_Email_Screenshot-5-660x335.jpg 660w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is amazing how phishing emails are becoming more sophisticated. We have recently added a product called SlashNext to help protect our environment from phishing emails. It has been doing a fantastic job of catching emails that passed every other detection method. Below are six samples of the emails captured and blocked from going to\u2026 <span class=\"read-more\"><a href=\"https:\/\/tekweis.com\/index.php\/2022\/11\/08\/phishing-emails\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-194","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/posts\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":5,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/posts\/194\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/posts\/194\/revisions\/206"}],"wp:attachment":[{"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/media?parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/categories?post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tekweis.com\/index.php\/wp-json\/wp\/v2\/tags?post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}