xorlab Logo
  • English
  • Deutsch
  • Product
    PRODUCTS
    inbound_email_security_icon inbound_email_security_icon_hover
    Inbound Email Security

    Stop modern email attacks with behavioral AI.

    abuse_mailbox_automation_icon abuse_mailbox_automation_icon_hover
    Abuse Mailbox Automation

    Streamline the management of your abuse mailbox.

    EXTENSIONS
    sandbox_icon sandbox_icon_hover
    Attachment Sandbox

    Analyze email attachments dynamically.

    contextual_banners_icon contextual_banners_icon_hover
    Contextual Banners

    Inform employees with situational banners in emails.

    ssq_icon ssq_icon_hover
    Self-Service Quarantine

    Empower employees to safely manage quarantined emails.

    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    FEATURED CONTENT
    Product updates

    Impact reporting, better search, and more – Release 7.0 preview

    Learn more
  • Solutions
    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    BY ENVIRONMENT
    on_prem_icon on_prem_icon_hover
    On-premise

    Replace or enhance your secure email gateway.

    m365_icon m365_icon_hover
    Microsoft 365

    Complement M365 with xorlab.

    BY ATTACK TYPE
    bec2_icon bec2_icon_hover
    BEC/fraud
    credential_phishing_icon credential_phishing_icon_hover
    Credential phishing
    email_hijacking_icon email_hijacking_icon_hover
    Email thread hijacking
    extortion_icon extortion_icon_hover
    Extortion scam
    html_smuggling_icon html_smuggling_icon_hover
    HTML smuggling
    malware_icon malware_icon_hover
    Malware/ransomware
    qr_code_icon qr_code_icon_hover
    QR code phishing
    spearphishing_icon spearphishing_icon_hover
    Spearphishing
  • Customers
  • Partners
  • Resources
    RESOURCES
    blog_icon blog_icon_hover
    Blog
    customer_stories_icon customer_stories_icon_hover
    Customer stories
    SERVICES
    attack_sim_target_icon attack_sim_target_icon_hover
    Email Attack Simulation
    DOWNLOADS
    guide_icon guide_icon_hover
    CISO guide
    checklist_icon checklist_icon_hover
    Healthcare checklist
    report_icon report_icon_hover
    Email Attack Simulation Report
    FEATURED CONTENT
    Email security in the AI age

    What modern attack simulations tell us about the state of email security today.

    Learn more
  • About
    about_us_icon about_us_icon_hover
    About us
    careers_icon careers_icon_hover
    Careers
    contact_icon contact_icon_hover
    Contact
  • Get a demo
  • English
  • Deutsch
Get a demo
  • There are no suggestions because the search field is empty.
  • All
  • Industry News / Trends
  • Threat Analysis
  • AI in Email Security
  • Company News
  • Customer Stories
  • Featured
  • Human Factor
  • Product Updates
  • Detection Engineering
  • Third-Party Risk Management
Black whale tail in the water
29 March, 2022

How to Defend against Whaling Attacks

Email attacks have been on the rise in recent years, and not only are they growing in number, but...
Picture of xorlab team xorlab team
• 3 min read
25 March, 2022

How to identify and prevent email impersonation attacks

Email impersonation is a phishing technique that involves using a fake email address that looks...
Picture of xorlab team xorlab team
• 3 min read
Chains and closed padlock on white keyboard
22 March, 2022

How to Defend against the Rising Threat of Ransomware-As-A-Service

As cybercriminals refine their methods and widen their scope of attack, many are turning to...
Picture of xorlab team xorlab team
• 4 min read
18 March, 2022

How Financial Services Can Defend Against Ransomware Attacks

Today’s cybercriminals are using increasingly sophisticated techniques to secure massive ransoms....
Picture of xorlab team xorlab team
• 4 min read
50 and 10 Euro and Dollar bills
16 March, 2022

How the Most Significant BEC Attacks of 2021 Unfolded

In recent years, BEC (business email compromise) attacks have become an especially common form of...
Picture of xorlab team xorlab team
• 3 min read
Man in suit and tie pointing at email, phone and tablet icons
15 March, 2022

How to Protect Corporate Mailboxes against Email Spoofing Attacks

Picture of xorlab team xorlab team
• 4 min read
Man with headphones and in white shirt working on the laptop
14 March, 2022

How to Prevent Vendor Email Compromise (VEC) Attacks

Vendor email compromise (VEC) is a particular type of business email compromise (BEC)—a large...
Picture of Threat Analysis team Threat Analysis team
• 4 min read
4 5 6 7 8
logo-white

Context matters.

Product

  • Product overview
  • Inbound Email Security
  • Abuse Mailbox Automation
  • See it in action

Solutions

  • xorlab for Microsoft 365
  • xorlab for on-premise email
  • xorlab for Google Workspace
  • Protection against specific threat classes

Company

  • About us
  • Careers
  • Contact us
  • Partner Portal
© xorlab AG. All rights reserved. Various trademarks are held by their respective owners. Learn more about how we protect your privacy.