Eavesdropping

Revoke Document Access: Auto-Expire and Re-Assign Permissions Remotely

June 07, 2024 / in Blog / by Zafar Khan, RPost CEO

If an information leak is not seen, is there a reportable breach?

You probably spent the bulk of your workweek wondering ‘where Armand will turn up Friday.’ If not, I understand 🤣 At any rate, I’ll end the suspense right here. I’m coming to you from the Black Forest in southeastern Germany—home of numerous fir trees and the distinctive (and delicious) chocolate and cherry cake that is one of my favorites. 

EvilProxy Saves US-Based Cybercriminals from Unemployment

May 03, 2024 / in Blog / by Zafar Khan, RPost CEO

GenAI is obsoleting an unlikely sector of American entrepreneurs.

Armand here, RPost’s product evangelist, writing from beautiful Charlotte. I’ve been discussing security and AI at the International Legal Technology Association conference along with some of my human RPost teammates, Gerlyn, Arianna, and Laura.

Protect Yourself From Phishing and Ransomware Attacks Threatening Your Personal Data

April 19, 2024 / in Blog / by Zafar Khan, RPost CEO

A battle between white and black (AI) hats.

Armand here again, your plucky, ready-to-fight RPost product evangelist, reporting for Tech Essentials. Not sure if you caught last Sunday’s 60 Minutes, but they ran a piece that echoes what we’ve been saying in this column for many months now: cybercriminals are getting a lot more sophisticated from a technology and business standpoint.

How to Prove What Content Was Actually Received by the Recipient and When

April 05, 2024 / in Blog / by Zafar Khan, RPost CEO

Champagne & Caviar or Eavesdropping AI & Registered Receipt Proof?

Armand here, RPost’s product evangelist. I spent the week in New Orleans at one of the largest insurance technology conferences and thought I would share an insight that really cuts across all industries. Warning: it’s sort of complex, but important for those concerned with financial and business risk.

Cybercriminals are Using Gen AI to Scale Their Email Attacks

March 29, 2024 / in Blog / by Zafar Khan, RPost CEO

Cybercriminals can now subscribe to black-hat AI as easily as Netflix. 

Armand here again reporting for Tech Essentials. This week, I’m writing to you from…my mom’s basement. This is so that I can try and get in the mindset of a cybercriminal trying to leverage AI to perpetrate a sophisticated email scam.

Empower Your Cybersecurity with RMail's Innovative Tools

July 28, 2023 / in Blog / by Zafar Khan, RPost CEO

Are you a routine kind of Guy or Gal?

[If you are a routine kind of person, stop reading here. If you consider yourself to be less bland, I challenge you to read to the end.]

Prevent, Detect and Disarm BEC-Initiated Wire Fraud (Mis-Payment) Attacks

May 19, 2023 / in Blog / by Zafar Khan, RPost CEO

After reading the recent FBI report on the state of email related cybercrime in 2022, one statistic popped out at me, when correlating different parts of the report related to Business Email Compromise and Ransomware. 

RMail Gateway AI can Read Content in Emails and Now in Attachments Too

April 07, 2023 / in Blog / by Zafar Khan, RPost CEO

“If I have to read one more article or see one more talking head on TV rant about the coming AI apocalypse, about how the Terminator/Matrix movies are coming to reality, about how my job will disappear as soon as next week, I’ll move to a cabin in the woods!” This quotation has been uttered en masse all year long, in some form or another, and most recently by Taylor Swift (kidding).

What does BEC Stand for?

September 30, 2022 / in Blog / by Zafar Khan, RPost CEO

We’ll Make Etymology of Acronym-Originated Tech Speak Interesting… and Useful. Yes, it’s still the year of the tiger – a year of supposed unbound prosperity. But with the stock market plunging, and cybercrime flourishing, I thought it might be nice to forget about tigers and put on another hat, one of an etymologist.

How to Detect if an Email is Monitored by Someone Other Than Recipient

September 12, 2022 / in Blog / by Zafar Khan, RPost CEO

The Face of Big Brother Changes, as do Wire Taps Back in the day, with Edward Snowden’s revelations about the NSA recording all our digital communications, it became apparent that George Orwell’s 1984 image of Big Brother was made manifest: Big Government.