Discover our blog

Phishing

The Art of Deception in Social Media Phishing

The growth of social media phishing can be largely attributed to the broadening reach of social media companies like ...

Spear Phishing

Are You in the Office? The Spear Phishing Attack You Won’t See Coming

Everyone has been the recipient of a phishing email. Most have been the target of an attempted spear phishing attack....

Phisher's Favorites

Phishers’ Favorites 2021 Year-in-Review: Financial Services Phishing Tops all Others

Today, Vade released our annual Phishers’ Favorites Year-in-Review. For this report, Vade analyzed 184,977 phishing...

Malware - Ransomware

How to prevent ransomware: the importance of user awareness

You could build the most sophisticated security system relying on the latest ransomware protection technologies. Still,...

Alert

Important Change Affecting Time-of-Click users

Vade is aware that the Time-of-Click feature in Vade for M365 has been leveraged by threat actors to pass off malicious...

Vade News

Announcing File Inspector for Threat Intel & Investigation

The latest feature for the beta of Threat Intel & Investigation is now live in Vade for M365. Vade partners and...

Research

Microsoft 365 phishing email: how hackers are using a 20-year-old text trick

In the email security game between hackers and users, adversaries employ various forms of masquerading with a file to...