Skip to main content

All articles

Bypassing the Gate: Threat Actors Abuse O365 Direct Send

Lost in Translation? Why Multilingual Threats Challenge Traditional Email Security—And How Intent-Based AI Fixes It

Smuggled Signals: Stealer Distributed via HTML Trojan

Extending NACE™ Intent-based Threat Prevention™ AI Platform for Multiple Languages

SurveyTraps: Dissecting the SurveyMonkey Phishing Surge

Weaponizing Trust: How Google Docs URL is Used as the Initial Access URL in Phishing

Redefining Grey Email Remediation with INTENT-BASED DETECTION

Weaponizing Trust: Fake Email Threads Behind $47,000 Financial Fraud—and NACE’s Countermeasure

Trust as a Weapon: Phishing Campaigns Leveraging Legitimate Platforms

Detecting and Distinguishing AI-Generated Text from Human Written Text

Pushing Boundaries: A Personal Reflection on the SC Awards Recognition

Upcoming Presentation RSA 2025 Presentation: Leveraging Generative and Predictive AI to Detect AI Based Attacks

From Voicemail to Compromised: How a Tiny HTM File Packs a Big Threat

Attackers Are Outsmarting Traditional Security with Evasive Threats

Deceptive Yet Detected: NACE Exposes SVG-Attachment Based Phishing Campaign

Deep Dive: NACE Combats BEC Customer Impersonation Employing Combosquatting

What is INTENT-BASED DETECTION for Email Security?

NACE vs. HTML Smuggling: Catching What Conventional Technology Misses

Neural Analysis and Correlation Engine vs. AI Generated Attacks

From Deception to Detection: Unmasking a Highly Targeted BEC Attack

3 + 1 = G-Suite Credential Phishing

Why Inception Cyber Stands Apart in Email Security

Unmasking Vendor Registration Scams: Insights from Two Real-World BEC Cases

DocuSign-Themed Phishing Campaign Exploits Trust in Legitimate Platforms

How a Sophisticated Credential Phishing Email Bypassed Google Workspace Filters

Neural Analysis and Correlation Engine vs. AI Generated Malware

InceptionCyber.ai to present research at AVAR 2024 & BlackHat MEA 2024

Transforming BEC Protection Against Generative AI Evasions with Deep Learning, Zero-Shot Classification, and Zero-Trust Principles

Rethinking Threat Prevention with an Evasion-first Mindset

Staying Ahead: Understanding the Latest Email Evasion Tactics

Harnessing Language Models to Stop Evasive Malicious Email Attachments/URLs