Discover our blog

Research

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

MSP Cybersecurity

How to Incorporate Vade for M365 Into Your MSP Security Stack

Cybersecurity is everyone’s responsibility, but the public puts their trust in managed service providers (MSPs) and IT...

Phishing

Phishers Impersonate Maersk to Exploit Global Supply Chain Chaos

Several waves of phishing emails impersonating Maersk have targeted more than 18,000 recipients, 13,000 recipients, and...

Email Security

Q1 2022 Phishing and Malware Report: Malware Skyrockets, Microsoft Is the Most Impersonated Brand

After a holiday slump in December 2021, cybercriminals returned to form in Q1 2022. Malware and phishing volumes across...

MSP Cybersecurity

8 anti-phishing tips for MSPs

Security is tough to prioritize for clients and managed service providers (MSPs) alike. Paying for cybersecurity can...
MSP Cybersecurity

How to Stand Out as an MSP Cybersecurity Leader

Security has become the key focus of the IT channel in recent years. Increasing cyberattacks and looming security...

Phishing

Phishing attack examples: campaign season is cybercrime season

As French President Emanuel Macron prepared to run for re-election this year, his campaign’s cybersecurity staff most...