Email Threat Simulator Description
- January 2, 2018
- Product Sheets
- Regularly tests your technological investments (such as firewalls, anti-spam and anti-virus), using simulation logic to mimic the attack vectors targeting organisations like yours through your email services.
- Techniques include email harvesting, domain squatting, vulnerability scanner, client-side attacks, malicious attachments, ransomware samples, misconfiguration, browser exploits and file format exploits.