Discover our blog

Research

Q2 2022 Phishing and Malware Report: Malware Volumes Increase 21% in Q2

After a drastic increase in malware emails in March 2022, malware leveled off in April and then rebounded in both May...

Research

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Spear Phishing

3 Types of Spear Phishing Emails and How MSPs Can Prevent Them

As a Managed Service Provider (MSP), it’s your job to keep your clients out of harm’s way. Unfortunately, in today’s...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Email Security

Email Threat Detection: What MSPs Need to Know

The cybersecurity situation has escalated to a point where every organization needs to have advanced email security...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Malware - Ransomware

Ransomware Attacks: Why Email Is Still the #1 Delivery Method

Ransomware attacks have been on the rise since 2019 and peaked during the pandemic in 2021, when 68 percent of...