Discover our blog

Vade News

Announcing File Inspector for Threat Intel & Investigation

The latest feature for the beta of Threat Intel & Investigation is now live in Vade for M365. Vade partners and...

Research

Microsoft 365 phishing email: how hackers are using a 20-year-old text trick

In the email security game between hackers and users, adversaries employ various forms of masquerading with a file to...

Phishing

3 Under-Recognized Ways Phishing Attacks Impact Businesses

What comes to mind when you think of the impact of phishing attacks? For most MSPs, SMBs, and other frequent phishing...

Malware - Ransomware

Anti-ransomware: avoiding the “pay or not to pay” dilemma

Ransomware attacks on MSPs are becoming more aggressive and more common, hence the need for adequate anti-ransomware...

Alert

Log4Shell Remote Code Execution Vulnerability

Vade is aware of the zero-day vulnerability in the open-source Apache Log4Shell (Log4j) utility, which could allow a...

Email Security

Email Security Predictions 2022: 4 Ways Hackers Will Target Businesses

It’s that time of year when we make our predictions about the biggest email security threats that will emerge in the...

Research

Apple and Amazon Invoice Scams Mimic Ongoing Tech Support Scams

As holiday season approaches and shopping gets underway, online receipts are hitting inboxes around the world....