xorlab Logo
  • English
  • Deutsch
  • Product
    PRODUCTS
    inbound_email_security_icon inbound_email_security_icon_hover
    Inbound Email Security

    Stop modern email attacks with behavioral AI.

    abuse_mailbox_automation_icon abuse_mailbox_automation_icon_hover
    Abuse Mailbox Automation

    Streamline the management of your abuse mailbox.

    EXTENSIONS
    sandbox_icon sandbox_icon_hover
    Attachment Sandbox

    Analyze email attachments dynamically.

    contextual_banners_icon contextual_banners_icon_hover
    Contextual Banners

    Inform employees with situational banners in emails.

    ssq_icon ssq_icon_hover
    Self-Service Quarantine

    Empower employees to safely manage quarantined emails.

    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    FEATURED CONTENT
    Product updates

    Impact reporting, better search, and more – Release 7.0 preview

    Learn more
  • Solutions
    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    BY ENVIRONMENT
    on_prem_icon on_prem_icon_hover
    On-premise

    Replace or enhance your secure email gateway.

    m365_icon m365_icon_hover
    Microsoft 365

    Complement M365 with xorlab.

    BY ATTACK TYPE
    bec2_icon bec2_icon_hover
    BEC/fraud
    credential_phishing_icon credential_phishing_icon_hover
    Credential phishing
    email_hijacking_icon email_hijacking_icon_hover
    Email thread hijacking
    extortion_icon extortion_icon_hover
    Extortion scam
    html_smuggling_icon html_smuggling_icon_hover
    HTML smuggling
    malware_icon malware_icon_hover
    Malware/ransomware
    qr_code_icon qr_code_icon_hover
    QR code phishing
    spearphishing_icon spearphishing_icon_hover
    Spearphishing
  • Customers
  • Partners
    partner_icon partner_icon_hover
    Become a partner
    partner_portal_icon partner_portal_icon_hover
    Partner portal
  • Resources
    RESOURCES
    blog_icon blog_icon_hover
    Blog
    customer_stories_icon customer_stories_icon_hover
    Customer stories
    SERVICES
    attack_sim_target_icon attack_sim_target_icon_hover
    Email Attack Simulation
    DOWNLOADS
    guide_icon guide_icon_hover
    CISO guide
    checklist_icon checklist_icon_hover
    Healthcare checklist
    report_icon report_icon_hover
    Email Attack Simulation Report
    FEATURED CONTENT
    Email security in the AI age

    What modern attack simulations tell us about the state of email security today.

    Learn more
  • About
    about_us_icon about_us_icon_hover
    About us
    careers_icon careers_icon_hover
    Careers
    contact_icon contact_icon_hover
    Contact
  • Get a demo
  • English
  • Deutsch
Get a demo
  • There are no suggestions because the search field is empty.
  • All
  • Industry News / Trends
  • Threat Analysis
  • AI in Email Security
  • Company News
  • Customer Stories
  • Featured
  • Human Factor
  • Product Updates
  • Detection Engineering
  • Third-Party Risk Management
candid_rsa25
8 May, 2025

[Video] Top takeaways from RSA Conference 2025

Last week, San Francisco hosted the annual RSA Conference, drawing over 44,000 attendees—surpassing...
Picture of Candid Wüest Candid Wüest
• 2 min read
6 May, 2025

Inside a parcel delivery phishing scam: a peek behind the curtain

You're probably familiar with parcel delivery phishing emails—they’re a common tactic and rank just...
Picture of Candid Wüest Candid Wüest
• 3 min read
8 April, 2025

Why today’s email security must be adaptive and AI-based

The evolving email threat landscape Email remains the most common attack vector for cybercriminals,...
Picture of xorlab team xorlab team
• 2 min read
3 April, 2025

The state of email security: insights from recent attack simulations

Email remains a top attack vector, and recent advancements in AI, automation, and...
Picture of xorlab team xorlab team
• 1 min read
31 March, 2025

The state of email security today: rising threats, growing challenges

Email remains one of the most critical communication tools for businesses, yet it also continues to...
Picture of xorlab team xorlab team
• 2 min read
24 March, 2025

The rise of agentic AI: a new chapter in cybersecurity challenges

Agentic AI is rapidly becoming a focal point in CISO discussions. Even simple AI agents with access...
Picture of Candid Wüest Candid Wüest
• 2 min read
13 February, 2025

The AI-powered malware era: hype or reality?

Malicious emails are often the first step in a cyber attack—like the opening move in a high-stakes...
Picture of xorlab team xorlab team
• 2 min read
6 February, 2025

Deepfake deception: the rise of AI-enhanced social engineering attacks

Guess what! Generative AI is still a topic in 2025.
Picture of xorlab team xorlab team
• 2 min read
19 December, 2024

Messaging threat predictions for 2025

Get ready for 2025: Here are five predictions about the evolving threats set to shape the...
Picture of Candid Wüest Candid Wüest
• 3 min read
17 December, 2024

From chaos to control: Insights from 24 email bombing waves

On November 13, at exactly 10:50, Lars’ day took an unexpected turn. Within 63 minutes, he received...
Picture of Threat Analysis team Threat Analysis team
• 5 min read
17 December, 2024

GenAI is not the end of the world

Last week, I had the pleasure of attending BSidesVienna and the DeepSec conference in Vienna. Lots...
Picture of Candid Wüest Candid Wüest
• 1 min read
4 December, 2024

PR: IT security expert Candid Wüest joins xorlab as Principal Security Advocate

Zurich, 04.12.2024 – xorlab AG is proud to announce the appointment of Candid Wüest as Principal...
Picture of xorlab team xorlab team
• 1 min read
A surreal depiction of a large firehose aimed at a person sitting at a desk
29 November, 2024

Email bombing: what you need to know

Email bombing, sometimes called "list linking" or "email cluster bombing," is a cyberattack that...
Picture of Threat Analysis team Threat Analysis team
• 2 min read
release_comms_header_image
5 September, 2024

Impact reporting, better search, and more – Release 7.0 preview

xorlab's latest update brings a host of exciting new features and enhancements designed to elevate...
Picture of Luca Della Toffola Luca Della Toffola
• 2 min read
Email security in healthcare
21 April, 2024

9 ways to shield healthcare providers from ransomware and data breaches

The current cyber threat landscape is dynamic and constantly evolving, it's clear that few sectors...
Picture of xorlab team xorlab team
• 3 min read
Open Redirect Vulnerabilities: The Hidden Danger in Email Security
27 March, 2024

Open Redirect Vulnerabilities: The Hidden Danger in Email Security

In this article, we explore how open redirects, a vulnerability in web applications, are leveraged...
Picture of Threat Analysis team Threat Analysis team
• 7 min read
29 February, 2024

Phishing on GitHub: A Sophisticated Attack Leveraging Brand Trust

During the last week there has been an uprise in phishing cases originating from GitHub, targeting...
Picture of Threat Analysis team Threat Analysis team
• 3 min read
18 January, 2024

New feature release: protection against QR code phishing

In 2023, our team observed a shift in phishing techniques, with attackers increasingly using QR...
Picture of xorlab team xorlab team
• 1 min read
10 January, 2024

xorlab achieves ISO/IEC 27001 certification for information security management

xorlab, a leading provider of innovative email security solutions, is proud to announce that it has...
Picture of Adrian Kyburz Adrian Kyburz
• 1 min read
27 June, 2023

HTML smuggling: How malicious actors use JavaScript and HTML to fly under the radar

HTML smuggling started to pop up in 2021 as a serious elusive loader technique used by threat...
Picture of Max Fischer Max Fischer
• 3 min read
11 April, 2023

Altoo Protects Customer Wealth with xorlab's Context-Intelligent Email Security

Email is one of the most common communication tools used by businesses, but it's also one of the...
Picture of xorlab team xorlab team
• 2 min read
28 February, 2023

xorlab Partners with Swisscom to Bring Context-Intelligent Email Security to Enterprise Customers

Zurich, Switzerland, February 28, 2023 – We are thrilled to announce that xorlab has entered into a...
Picture of xorlab team xorlab team
• 1 min read
23 February, 2023

Testing Our Defenses Against ChatGPT-Generated Phishing & Fraud Emails

Phishing, fraud, and extortion attack simulations have become an essential tool in the fight...
Picture of Threat Analysis team Threat Analysis team
• 4 min read
AI hand typing on keyboard
19 January, 2023

Why AI-powered phishing will become a serious security issue for your organization

Will large text-generating AI models be the future of communication-based cyber attacks?
Picture of Max Fischer Max Fischer
• 15 min read
12 October, 2022

Combating Business Email Compromise with Context Intelligence

Business Email Compromise (BEC) is an attack in which the bad actor delivers phishing, fraud, or...
Picture of xorlab team xorlab team
• 2 min read
21 June, 2022

Data exfiltration: Most common techniques and best prevention tactics

When cybercriminals target organizations, the goal is usually to exfiltrate information for...
Picture of Threat Analysis team Threat Analysis team
• 5 min read
Blue and grey glass office buldings and blue sky
17 June, 2022

How to Protect against Business Email Compromise (BEC) Attacks

Business Email Compromise (BEC) attacks can be devastating for any company, and they’re becoming...
Picture of xorlab team xorlab team
• 9 min read
red and black writing, xorlab logo and CyberTech100 logo
31 May, 2022

xorlab Recognized among CyberTech100 for Helping Financial Institutions Combat Cyber Threats

Picture of xorlab team xorlab team
• 2 min read
18 May, 2022

xorlab awarded Innosuisse Certificate

Picture of xorlab team xorlab team
• 1 min read
Man hand pointing at lock, cart, email, dollar icons
6 May, 2022

How to protect businesses against supply chain attacks

In December 2020, FireEye announced that bad actors had infiltrated its network, revealing how...
Picture of xorlab team xorlab team
• 10 min read
hand pushing wooden dominoes
28 April, 2022

5 supply chain attacks that started with a phishing email & how to prevent them

Phishing is the most common attack vector and played a part in over a third of all breaches in...
Picture of xorlab team xorlab team
• 4 min read
22 April, 2022

How to Protect Businesses against Ransomware Attacks

Picture of xorlab team xorlab team
• 14 min read
People sitting around a metal tower in a government building
31 March, 2022

Mitigating the Risk of Ransomware Attacks against Government Entities

Government institutions are among the top targets for ransomware. In 2020, cyber attacks cost US...
Picture of xorlab team xorlab team
• 5 min read
Black whale tail in the water
29 March, 2022

How to Defend against Whaling Attacks

Email attacks have been on the rise in recent years, and not only are they growing in number, but...
Picture of xorlab team xorlab team
• 3 min read
25 March, 2022

How to identify and prevent email impersonation attacks

Email impersonation is a phishing technique that involves using a fake email address that looks...
Picture of xorlab team xorlab team
• 3 min read
Chains and closed padlock on white keyboard
22 March, 2022

How to Defend against the Rising Threat of Ransomware-As-A-Service

As cybercriminals refine their methods and widen their scope of attack, many are turning to...
Picture of xorlab team xorlab team
• 4 min read
18 March, 2022

How Financial Services Can Defend Against Ransomware Attacks

Today’s cybercriminals are using increasingly sophisticated techniques to secure massive ransoms....
Picture of xorlab team xorlab team
• 4 min read
50 and 10 Euro and Dollar bills
16 March, 2022

How the Most Significant BEC Attacks of 2021 Unfolded

In recent years, BEC (business email compromise) attacks have become an especially common form of...
Picture of xorlab team xorlab team
• 3 min read
Man in suit and tie pointing at email, phone and tablet icons
15 March, 2022

How to Protect Corporate Mailboxes against Email Spoofing Attacks

Picture of xorlab team xorlab team
• 4 min read
Man with headphones and in white shirt working on the laptop
14 March, 2022

How to Prevent Vendor Email Compromise (VEC) Attacks

Vendor email compromise (VEC) is a particular type of business email compromise (BEC)—a large...
Picture of Threat Analysis team Threat Analysis team
• 4 min read
Patient monitoring system screen in hospital room
11 March, 2022

Account Takeover Protection Strategies for Hospitals

Picture of xorlab team xorlab team
• 4 min read
3 grey metal chain links on grey background
9 March, 2022

How to Minimize Supply Chain Attack Surface

Today’s supply chains are massive, and a growing number of bad actors are taking advantage of...
Picture of xorlab team xorlab team
• 4 min read
Tall telecommunications tower and clear blue sky
24 February, 2022

The rise of ransomware in telecommunications

Bad actors are always on the lookout for new vulnerabilities, and they’re constantly improving...
Picture of xorlab team xorlab team
• 4 min read
Top 5 Microsoft 365 Email Security Concerns
24 February, 2022

Top 5 Microsoft 365 email security concerns

Microsoft leads the cloud-based productivity software market with its Microsoft 365 suite. The...
Picture of xorlab team xorlab team
• 5 min read
Two men and one woman looking at a laptop inside a manufacturing building
23 February, 2022

How Ransomware Attacks Impact the Manufacturing Industry

Picture of xorlab team xorlab team
• 5 min read
Short-haired blonde woman reading her emails on the computer
17 February, 2022

How to Protect Your Organization against Spear Phishing Attacks

Studies have shown that 91% of all cyber attacks start with a phishing email. Cyber criminals use...
Picture of xorlab team xorlab team
• 5 min read
16 February, 2022

Impact of ransomware on the healthcare sector

In the last few years, ransomware has become the greatest concern for many institutions, especially...
Picture of xorlab team xorlab team
• 5 min read
Hands typing on keyboard and big and small locks over keyboard
15 February, 2022

Most Common Ransomware Attack Vectors

Picture of xorlab team xorlab team
• 5 min read
11 February, 2022

Implenia Doubles Email Threat Detection with xorlab

As Switzerland’s leading construction and real estate service provider, cybersecurity has always...
Picture of xorlab team xorlab team
• 3 min read
People in dark hoodies standing with their arms crossed
26 October, 2021

Successful Series A Funding Round Closed

Swiss-based cyber defense company xorlab has closed CHF 6.1 million in Series A funding. The round...
Picture of xorlab team xorlab team
• 1 min read
Black and red circles on white background
26 August, 2021

xorlab Was Selected to the CyberTech100 List

Zurich, 14th June 2021 – Swiss cybersecurity company xorlab, an innovative provider of proactive...
Picture of xorlab team xorlab team
• 2 min read
3 fishing hooks holding a letter, a padlock, and an ID card
9 August, 2021

Phishing Gets Personal

Picture of xorlab team xorlab team
• 5 min read
logo-white

Context matters.

Product

  • Product overview
  • Inbound Email Security
  • Abuse Mailbox Automation
  • See it in action

Solutions

  • xorlab for Microsoft 365
  • xorlab for on-premise email
  • xorlab for Google Workspace
  • Protection against specific threat classes

Company

  • About us
  • Careers
  • Contact us
  • Partner Portal
© xorlab AG. All rights reserved. Various trademarks are held by their respective owners. Learn more about how we protect your privacy.