xorlab Logo
  • English
  • Deutsch
  • Product
    PRODUCTS
    inbound_email_security_icon inbound_email_security_icon_hover
    Inbound Email Security

    Stop modern email attacks with behavioral AI.

    abuse_mailbox_automation_icon abuse_mailbox_automation_icon_hover
    Abuse Mailbox Automation

    Streamline the management of your abuse mailbox.

    EXTENSIONS
    sandbox_icon sandbox_icon_hover
    Attachment Sandbox

    Analyze email attachments dynamically.

    contextual_banners_icon contextual_banners_icon_hover
    Contextual Banners

    Inform employees with situational banners in emails.

    ssq_icon ssq_icon_hover
    Self-Service Quarantine

    Empower employees to safely manage quarantined emails.

    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    FEATURED CONTENT
    Product updates

    Impact reporting, better search, and more – Release 7.0 preview

    Learn more
  • Solutions
    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    BY ENVIRONMENT
    on_prem_icon on_prem_icon_hover
    On-premise

    Replace or enhance your secure email gateway.

    m365_icon m365_icon_hover
    Microsoft 365

    Complement M365 with xorlab.

    BY ATTACK TYPE
    bec2_icon bec2_icon_hover
    BEC/fraud
    credential_phishing_icon credential_phishing_icon_hover
    Credential phishing
    email_hijacking_icon email_hijacking_icon_hover
    Email thread hijacking
    extortion_icon extortion_icon_hover
    Extortion scam
    html_smuggling_icon html_smuggling_icon_hover
    HTML smuggling
    malware_icon malware_icon_hover
    Malware/ransomware
    qr_code_icon qr_code_icon_hover
    QR code phishing
    spearphishing_icon spearphishing_icon_hover
    Spearphishing
  • Customers
  • Partners
  • Resources
    RESOURCES
    blog_icon blog_icon_hover
    Blog
    customer_stories_icon customer_stories_icon_hover
    Customer stories
    SERVICES
    attack_sim_target_icon attack_sim_target_icon_hover
    Email Attack Simulation
    DOWNLOADS
    report_icon report_icon_hover
    Email Attack Simulation Report
    FEATURED CONTENT
    Email security in the AI age

    What modern attack simulations tell us about the state of email security today.

    Learn more
  • About
    about_us_icon about_us_icon_hover
    About us
    careers_icon careers_icon_hover
    Careers
    contact_icon contact_icon_hover
    Contact
  • Attack Simulation
    Get a Demo
  • English
  • Deutsch
Attack Simulation
Get a Demo
  • There are no suggestions because the search field is empty.
  • All
  • Industry News / Trends
  • Threat Analysis
  • AI in Email Security
  • Company News
  • Featured
  • Human Factor
  • Customer Stories
  • Detection Engineering
  • Product Updates
  • Third-Party Risk Management
16 December, 2025

Will 2026 Be the Year of Agentic AI and Automated Attacks?

Agentic Insider Threats Useful production AI implementations are still far from everywhere, but...
Picture of Candid Wüest Candid Wüest
• 6 min read
12 December, 2025

New Phishing Wave Exploits Google's Application Integration Service

Attackers are abusing Google's Application Integration service to send phishing emails from...
Picture of Threat Analysis team Threat Analysis team
• 2 min read
10 December, 2025

Yutani Loop: Building an Agentic Malware PoC to Understand Tomorrow's Threats

This post accompanies one of our talks at Black Hat Europe 2025. For broader context on AI-powered...
Picture of Candid Wüest Candid Wüest
• 3 min read
10 December, 2025

From Vibe Hacking to Agentic Threats: The Truth About AI Malware

This post is based on a talk by our resident researcher Candid Wüest at Black Hat Europe 2025....
Picture of Candid Wüest Candid Wüest
• 7 min read
Men in the office looking at financial data on their computers
3 December, 2025

Man-in-the-Middle Attack Prevention Strategies for Financial Institutions

A man-in-the-middle (MITM) attack happens when a bad actor intercepts traffic as it’s transmitted...
Picture of xorlab team xorlab team
• 4 min read
16 August, 2025

It's cyber week in Las Vegas: Impressions from Black Hat, BSidesLV, and DEF CON

Earlier this month, Las Vegas was once again flooded with thousands of cybersecurity enthusiasts in...
Picture of Candid Wüest Candid Wüest
• 3 min read
14 August, 2025

CVE-2025-8088: How xorlab stops this WinRAR zero-day before it hits the inbox

CVE-2025-8088 is a newly disclosed zero-day vulnerability in WinRAR’s file parsing logic that...
Picture of Threat Analysis team Threat Analysis team
• 2 min read
1 2 3 4 5
logo-white

Context matters.

Product

  • Product overview
  • Inbound Email Security
  • Abuse Mailbox Automation
  • See it in action

Solutions

  • xorlab for Microsoft 365
  • xorlab for on-premise email
  • xorlab for Google Workspace
  • Protection against specific threat classes

Company

  • About us
  • Careers
  • Contact us
  • Partner Portal
© xorlab AG. All rights reserved. Various trademarks are held by their respective owners. Learn more about how we protect your privacy.