Skip to main content
Why Inception
Show submenu for Solutions
Solutions
AI-Powered Email Threats
Ransomware and Malware
Phishing and Malicious URLs
QR Code Phishing
Business Email Compromise
Social Engineering
Resources
Show submenu for Company
Company
News and Press
About Us
Blog
Open main navigation
Close main navigation
Why Inception
Show submenu for Solutions
Solutions
Solutions
AI-Powered Email Threats
Ransomware and Malware
Phishing and Malicious URLs
QR Code Phishing
Business Email Compromise
Social Engineering
Resources
Show submenu for Company
Company
Company
News and Press
About Us
Blog
Let's Talk!
Let's Talk!
Sort by Blog Topic
Threat Research
Attack Analysis
AI
Technical Leadership
Email Security Trends
BEC
Phishing
Malware
Evasive Threats
Articles About Intent-Based Security: Threat Research
May 5, 2025 12:23:26 PM
Weaponizing Trust: Fake Email Threads Behind $47,000 Financial Fraud—and NACE’s Countermeasure
Read article
Apr 21, 2025 4:15:43 PM
Trust as a Weapon: Phishing Campaigns Leveraging Legitimate Platforms
Read article
Apr 8, 2025 8:23:20 PM
Detecting and Distinguishing AI-Generated Text from Human Written Text
Read article
Mar 25, 2025 2:25:57 PM
Upcoming Presentation RSA 2025 Presentation: Leveraging Generative and Predictive AI to Detect AI Based Attacks
Read article
Mar 14, 2025 1:36:18 AM
From Voicemail to Compromised: How a Tiny HTM File Packs a Big Threat
Read article
Mar 6, 2025 4:10:18 PM
Deceptive Yet Detected: NACE Exposes SVG-Attachment Based Phishing Campaign
Read article
Feb 18, 2025 1:00:36 PM
Deep Dive: NACE Combats BEC Customer Impersonation Employing Combosquatting
Read article
Feb 12, 2025 5:51:21 PM
NACE vs. HTML Smuggling: Catching What Conventional Technology Misses
Read article
Feb 3, 2025 4:56:49 PM
Neural Analysis and Correlation Engine vs. AI Generated Attacks
Read article
Jan 29, 2025 10:02:37 PM
From Deception to Detection: Unmasking a Highly Targeted BEC Attack
Read article
Jan 15, 2025 1:25:57 PM
3 + 1 = G-Suite Credential Phishing
Read article
Jan 8, 2025 5:14:01 PM
Unmasking Vendor Registration Scams: Insights from Two Real-World BEC Cases
Read article