Latest Version 5.4.0
October 15, 2025
Cyberattacks can come from many different vectors, but they most commonly arrive via email. By using email to conduct phishing, business email compromise (BEC) attacks, brand impersonation and more, attackers leverage an organization’s weakest security link — its people — to wreak havoc. As a result, email is the No. 1 attack vector for security teams to secure.
(0)
Categories
Created By
Type
Downloads
Featured in Collection
Splunk Answers
Ask a question about this app listing(Opens new window)Resources