Table of contents

    The state of email security: insights from recent attack simulations

    Email remains a top attack vector, and recent advancements in AI, automation, and cybercrime-as-a-service have made email threats more sophisticated than ever. These evolving tactics allow cybercriminals to bypass traditional security measures, leading to an increase in phishing, business email compromise (BEC), and ransomware reaching users' inboxes.

    To assess the effectiveness of existing security solutions, xorlab conducted over 20 email attack simulations across different environments, including Secure Email Gateways (SEG), built-in security controls of Cloud Email Providers (CEP), and additional protection layers like Integrated Cloud Email Security (ICES). The results highlight key challenges and provide actionable recommendations for improving email security.

    How AI and automation are reshaping email attacks

    AI-driven attacks are becoming more sophisticated, enabling cybercriminals to scale phishing campaigns, personalize social engineering tactics, and automate multi-stage attacks. In some cases, attackers even use AI-generated chatbots and deepfake videos to impersonate executives or manipulate victims into fraudulent actions.

    These advancements make it increasingly difficult for traditional security measures—such as static threat intelligence and signature-based detection—to keep up. Organizations need advanced security solutions capable of analyzing behavioral patterns and contextual signals to detect and stop AI-driven attacks in real time.

    Key findings from email attack simulations

    xorlab’s simulations tested different security setups to measure their effectiveness against real-world email threats. We found:

    • High attack success rates: On average, 53% of simulated attacks bypassed security measures and reached users' inboxes.
    • Layered security provides better protection: Organizations using an additional detection layer on top of their Cloud Email Provider’s built-in security saw improved results, though 41% of attacks still made it through.
    • Challenges in hybrid setups: Some configurations, particularly when SEGs were placed before cloud security, showed lower detection rates. Ensuring proper integration and alignment of security layers is crucial.
    • BEC and fraud remain hardest to detect: 68% of business email compromise attacks (BEC) bypassed security measures, as they often lack traditional indicators like malicious attachments or links.

    The limitations of traditional email filters

    Many email security solutions rely heavily on known threat intelligence and static detection methods. However, attackers increasingly use legitimate infrastructures—such as compromised accounts or well-known cloud services—to evade detection. This makes distinguishing between a trusted business email and a well-crafted attack more challenging.

    Additionally, cybercriminals continuously refine their tactics, using AI-driven social engineering, adaptive phishing techniques, and polymorphic malware to stay ahead of traditional defenses. Without real-time behavioral analysis and adaptive threat detection, security teams struggle to keep pace.

    Next steps for stronger email security

    With modern threats evolving rapidly, organizations must take a proactive approach to email security:

    1. Adopt AI-powered threat detection to analyze patterns and context beyond static indicators.
    2. Ensure security layers are properly integrated to maximize detection rates and minimize blind spots.
    3. Regularly test security effectiveness with attack simulations to identify gaps and improve defenses.
    4. Train employees on evolving threats to reduce the risk of human error.

    By addressing these challenges with an adaptive, multi-layered security strategy, organizations can better protect themselves against the next generation of email attacks.