Bec

The Third-Party Risk No One Sees Coming

October 24, 2025 / in Blog / by Zafar Khan, RPost CEO

The Hidden Unknown of Leaks You Will Never See

Rocky the Raptor here, RPost’s cybersecurity product evangelist. In the cybersecurity world, the threats that hurt the most are the ones you never see coming - the hidden unknowns. 

RAPTOR AI Protects Against Impersonation Lures That Human Eyes Can’t Catch

October 03, 2025 / in Blog / by Zafar Khan, RPost CEO

Beyond Human Training: The AI Defense Layer.

Rocky the Raptor here, your friendly neighborhood cybersecurity evangelist from RPost. At the recent Gartner IT Security Conference I attended, a hot topic sparked discussion:
“Are Humans Trainable to Spot AI-Powered Impersonation Lures?”

Email Account Takeover Replaces Man-in-the-Middle Attacks: What You Need to Know

September 05, 2025 / in Blog / by Zafar Khan, RPost CEO

The Proverbial Cybersecurity “Man-in-the-Middle” Attack Not In Vogue Anymore...

Hey there, Rocky the Raptor here, swooping in to chat about a big shift in the world of cyber threats. Back in the day, companies (especially law firms) worried a lot about what we used to call a “Man-in-the-Middle” attack.

3 Deepfake Impersonation Schemes Cybercriminals Love—and How RPost Stops Them

November 29, 2024 / in Blog / by Zafar Khan, RPost CEO

Falling Prey or Praying Not to Fall Prey. Or, Praying for Man City’s Rodri or Chelsea?

I was over in London for the International Legal Technology Association Europe conference and could not help fixating on not only the cybercriminal tactics targeting law firms (and all firms for that matter) but also the Premier League “Football”.

Cybercriminals' BEC Schemes Exploit Athletes in Soccer’s Golden Era

September 17, 2024 / in Blog / by Zafar Khan, RPost CEO

For Cybercriminals and Lamine Yamal, it's a “Golden Generation” — for Pulisic and US Soccer, it's not so Golden.

Armand here, RPost’s armadillo product evangelist. I was considering getting back to my main passion of talking “tech” (with an RPost spin of course 😉) but couldn’t help thinking about sports and gold.

Top Three FBI-Special-Agent Speaker Insights on BEC

May 05, 2023 / in Blog / by Zafar Khan, RPost CEO

We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).

The Top Cybersecurity Trends of 2022

December 30, 2022 / in Blog / by Zafar Khan, RPost CEO

What were the top tech and eSecurity trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]

How to Alert a Sender if The Recipient Email is Malicious

November 11, 2022 / in Blog / by Zafar Khan, RPost CEO

RMail’s Lookalike Domain Detector Alerts a Sender after They Click Forward, Reply or Reply All–before the Email Is Sent Before we begin today’s tech tip, we first wholeheartedly thank all Veterans for their courage and commitment past and present. It is this, that gives us others the opportunity to worry about free society business risks, […]

Top 5 Insurance Tech Issues & Insights From AppliedNet at Optimize!22

November 09, 2022 / in Blog / by Zafar Khan, RPost CEO

From AppliedNet, The Top 5 InsurTech Peer Insights (We Took Notes For You) To extend the premise of today’s in-person user conferences – learning from peers – we’ve prepared a list of the five most significant issues or insights that we heard from insurance agents’ and brokers’ conference participants in October.

Alert on External Email When There Is an Actual Issue

October 21, 2022 / in Blog / by Zafar Khan, RPost CEO

Only RMail offers features that can foil BEC attacks without “cry wolf” email stamps. We’ve talked a lot about the hydra of BEC (business email compromise) attacks recently due to the increasing share of these types of attacks within the universe of cybercrime that employ multiple techniques to lure users into sending money to the […]