Return Path and Vade Secure strengthen partnership to optimize protection of 500 million email inboxes and thousands of senders
Working together for over 3 years, Return Path and Vade Secure continue to refine and enhance their solutions to identify legitimate advertisers and prevent cyberattacks
Paris, December 11, 2018 – Return Path, email intelligence market […]
At Vade Secure, we’re no strangers to spear phishing attacks. Our email security solutions identify these threats all the time for customers, thanks to our ability to detect not only exact sender or domain spoofing but visible alias spoofing and cousin domains. Recently, though, I came across a spear phishing attack that hit a little too close to home. That’s because I was the target!
In a preceding article, we conducted a study on a malicious email and noted that code could be executed when attachments were opened. Today we will focus on these malicious codes that are executed. We will come to understand what they are doing and what techniques are used to complicate the work of analysts and to bypass protections.
Email is known to be the vector of serious threats like phishing, which target credentials; spear-phishing, which usurps the identity of a colleague with the sole aim of inducing a fraudulent wire transfer or sharing of sensitive data; or malwares, which compromise the security of your information system.
SIEMs is intimately linked to the specific hierarchy of collection agents, the choice of priorities for the inspection of events and the weighting of anomalies. The work of administrators is essential to develop a system profile and to identify abnormal operating conditions. Indeed, a statistical correlation engine, even the most powerful, will not yield any usable results if the tool is not correctly calibrated.
Vade Secure for Office 365 is the only email security solution that sits inside Office 365, thanks to its native integration with the Microsoft API. Powered by artificial intelligence, the solution provides best-in-class protection against […]
Subscribe to our newsletter
- Alerts last cyber attacks (9)
- Anticipate Cyberattaks (30)
- Business performance (11)
- Choose my protection system (22)
- Email Security (48)
- How to protect yourself (17)
- Internet Service Provider (2)
- Malware – Ransomware (26)
- Office365 (11)
- Phishing (41)
- Spam – non-priority emails (11)
- Spear Phishing – Targeted Attacks (22)
- Testimonials (6)
- Testimonials_Office365 (2)
- The new cyber attacks (29)
- Uncategorized (2)
- User Experience (3)
Recent tweets on @vadesecure
- 12 hours ago
- 12 hours ago
- 2 days ago