Skip to main content
Why Inception
Show submenu for Solutions
Solutions
AI-Powered Email Threats
Ransomware and Malware
Phishing and Malicious URLs
QR Code Phishing
Business Email Compromise
Social Engineering
Resources
Show submenu for Company
Company
News and Press
About Us
Blog
Open main navigation
Close main navigation
Why Inception
Show submenu for Solutions
Solutions
Solutions
AI-Powered Email Threats
Ransomware and Malware
Phishing and Malicious URLs
QR Code Phishing
Business Email Compromise
Social Engineering
Resources
Show submenu for Company
Company
Company
News and Press
About Us
Blog
Let's Talk!
Let's Talk!
Sort by Blog Topic
Threat Research
Attack Analysis
Technical Leadership
Phishing
Malware
AI
Email Security Trends
Evasive Threats
BEC
Articles About INTENT-BASED SECURITY
TM: Threat Research
Jan 30, 2026 2:04:21 PM
Illusion of Safety: How Spray-and-Pray Attacks Are Slipping Past Legacy Email Defence
Read article
Jan 20, 2026 4:19:33 PM
Contextual Reasoning of NACE, Intent-based Threat Prevention™, AI Platform
Read article
Jan 8, 2026 1:31:10 PM
Brand Impersonation in the Age of AI: Why Intent Matters More Than Brand Names
Read article
Dec 30, 2025 1:24:04 AM
Advanced Threat Detection: Categories, Mechanisms, and Attack Coverage
Read article
Dec 5, 2025 7:50:18 PM
The Intent Breakthrough: Redefining Email Security with a new category of Intent-Based Detection™
Read article
Nov 7, 2025 12:42:55 PM
Intent-Driven Contextual Reasoning Across Email Conversations: Announcing NACE™ 3.0
Read article
Oct 10, 2025 9:57:38 PM
The Anatomy of a Deception: The HOA Impersonation Scam
Read article
Sep 26, 2025 4:06:31 PM
Geopolitically Motivated Hacktivist Campaigns: Recent Coordinated Cyber Attacks Targeting Indian Corporations
Read article
Aug 11, 2025 2:44:22 PM
Bypassing the Gate: Threat Actors Abuse O365 Direct Send
Read article
Jul 22, 2025 6:38:46 PM
Smuggled Signals: Stealer Distributed via HTML Trojan
Read article
Jul 3, 2025 1:52:32 PM
SurveyTraps: Dissecting the SurveyMonkey Phishing Surge
Read article
May 26, 2025 6:32:14 PM
Weaponizing Trust: How Google Docs URL is Used as the Initial Access URL in Phishing
Read article