Discover our blog

Spear Phishing

BEC Scam: How to Avoid Becoming a Victim

Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re...

MSP Cybersecurity

What is a Brute Force Attack? Common Types and How to Prevent Them

According to IBM’s Cost of a Data Breach 2022 Report, stolen or compromised account credentials are the most common...

Vade News

Announcing Reported Emails for Vade for M365

Vade is pleased to announce the release of Reported emails, a new feature of Vade for M365. With this latest...

Research

The Challenges of Phishing Detection (Part 3): Improve Accuracy with Hybrid Models

This article is the third of a series of four related to the challenges that we face to detect phishing at scale with...

Malware - Ransomware

Data Exfiltration: Why Ransomware is About More Than the Ransom

If you’re like most organizations, the term “ransomware” conjures up nightmares of hackers infiltrating your network,...

Email Security

Email security predictions 2023: 4 must-see trends shaping the industry

Keeping up with the latest developments in email security is mission-critical for your business. In H1 2022, Vade...

Vade News

Vade Cloud Now Supports DKIM Signing for Outbound Messages

Vade is pleased to announce that Vade Cloud now supports DKIM (DomainKey Identified Mail) signing for all outbound...