Every organization depends on email for conducting their business operations. However, a significant challenge lies in the inherent lack of security in email systems. This vulnerability provides an avenue for malicious actors to exploit email as a means to pilfer information, disrupt business activities, or gain unauthorized access to financial resources. These attackers leverage the email's security gaps to execute various types of attacks, including spam campaigns, malware distribution, phishing schemes, and business email compromise (BEC) attacks.