xorlab Logo
  • English
  • Deutsch
  • Product
    PRODUCTS
    inbound_email_security_icon inbound_email_security_icon_hover
    Inbound Email Security

    Stop modern email attacks with behavioral AI.

    abuse_mailbox_automation_icon abuse_mailbox_automation_icon_hover
    Abuse Mailbox Automation

    Streamline the management of your abuse mailbox.

    EXTENSIONS
    sandbox_icon sandbox_icon_hover
    Attachment Sandbox

    Analyze email attachments dynamically.

    contextual_banners_icon contextual_banners_icon_hover
    Contextual Banners

    Inform employees with situational banners in emails.

    ssq_icon ssq_icon_hover
    Self-Service Quarantine

    Empower employees to safely manage quarantined emails.

    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    FEATURED CONTENT
    Product updates

    Impact reporting, better search, and more – Release 7.0 preview

    Learn more
  • Solutions
    PLATFORM
    overview2_icon overview2_icon_hover
    Platform overview

    The xorlab Security Platform at a glance.

    BY ENVIRONMENT
    on_prem_icon on_prem_icon_hover
    On-premise

    Replace or enhance your secure email gateway.

    m365_icon m365_icon_hover
    Microsoft 365

    Complement M365 with xorlab.

    BY ATTACK TYPE
    bec2_icon bec2_icon_hover
    BEC/fraud
    credential_phishing_icon credential_phishing_icon_hover
    Credential phishing
    email_hijacking_icon email_hijacking_icon_hover
    Email thread hijacking
    extortion_icon extortion_icon_hover
    Extortion scam
    html_smuggling_icon html_smuggling_icon_hover
    HTML smuggling
    malware_icon malware_icon_hover
    Malware/ransomware
    qr_code_icon qr_code_icon_hover
    QR code phishing
    spearphishing_icon spearphishing_icon_hover
    Spearphishing
  • Customers
  • Partners
  • Resources
    RESOURCES
    blog_icon blog_icon_hover
    Blog
    customer_stories_icon customer_stories_icon_hover
    Customer stories
    SERVICES
    attack_sim_target_icon attack_sim_target_icon_hover
    Email Attack Simulation
    DOWNLOADS
    guide_icon guide_icon_hover
    CISO guide
    checklist_icon checklist_icon_hover
    Healthcare checklist
    report_icon report_icon_hover
    Email Attack Simulation Report
    FEATURED CONTENT
    Email security in the AI age

    What modern attack simulations tell us about the state of email security today.

    Learn more
  • About
    about_us_icon about_us_icon_hover
    About us
    careers_icon careers_icon_hover
    Careers
    contact_icon contact_icon_hover
    Contact
  • Get a demo
  • English
  • Deutsch
Get a demo
  • There are no suggestions because the search field is empty.
  • All
  • Industry News / Trends
  • Threat Analysis
  • AI in Email Security
  • Company News
  • Customer Stories
  • Featured
  • Human Factor
  • Product Updates
  • Detection Engineering
  • Third-Party Risk Management
23 February, 2023

Testing Our Defenses Against ChatGPT-Generated Phishing & Fraud Emails

Phishing, fraud, and extortion attack simulations have become an essential tool in the fight...
Picture of Threat Analysis team Threat Analysis team
• 4 min read
AI hand typing on keyboard
19 January, 2023

Why AI-powered phishing will become a serious security issue for your organization

Will large text-generating AI models be the future of communication-based cyber attacks?
Picture of Max Fischer Max Fischer
• 15 min read
12 October, 2022

Combating Business Email Compromise with Context Intelligence

Business Email Compromise (BEC) is an attack in which the bad actor delivers phishing, fraud, or...
Picture of xorlab team xorlab team
• 2 min read
21 June, 2022

Data exfiltration: Most common techniques and best prevention tactics

When cybercriminals target organizations, the goal is usually to exfiltrate information for...
Picture of Threat Analysis team Threat Analysis team
• 5 min read
hand pushing wooden dominoes
28 April, 2022

5 supply chain attacks that started with a phishing email & how to prevent them

Phishing is the most common attack vector and played a part in over a third of all breaches in...
Picture of xorlab team xorlab team
• 4 min read
Black whale tail in the water
29 March, 2022

How to Defend against Whaling Attacks

Email attacks have been on the rise in recent years, and not only are they growing in number, but...
Picture of xorlab team xorlab team
• 3 min read
Man with headphones and in white shirt working on the laptop
14 March, 2022

How to Prevent Vendor Email Compromise (VEC) Attacks

Vendor email compromise (VEC) is a particular type of business email compromise (BEC)—a large...
Picture of Threat Analysis team Threat Analysis team
• 4 min read
1 2 3
logo-white

Context matters.

Product

  • Product overview
  • Inbound Email Security
  • Abuse Mailbox Automation
  • See it in action

Solutions

  • xorlab for Microsoft 365
  • xorlab for on-premise email
  • xorlab for Google Workspace
  • Protection against specific threat classes

Company

  • About us
  • Careers
  • Contact us
  • Partner Portal
© xorlab AG. All rights reserved. Various trademarks are held by their respective owners. Learn more about how we protect your privacy.