The price of success: Office 365 is becoming increasingly popular with companies.... and hackers. Faced with increasingly sophisticated threats, what solutions does Office 365 offer? Review of strengths and weaknesses.
Phishing and insider attacks are on the rise, but an even more ominous threat is gaining ground at the same time. This is the multi-phase attack, which combines phishing with spear phishing and insider attack techniques.
Netflix Phishing Gets a Holiday Bump, Takes Number Two Spot in Vade Secure’s Q4 Phishers’ Favorites Report
Microsoft remains the number one impersonated brand with 2.3 times more phishing URLs than Netflix driven by a rise in multi-phased attacks
SAN FRANCISCO, CALIF. – Jan. 23, 2019 – Vade Secure
Proliferation of data leaks and security breaches of unprecedented complexity: what to remember about cybercrime in 2018
Hem (59), December xx, 2018 - Vade Secure, the French software publisher and world specialist in email security (500 million protected mailboxes in 76 countries), reviews the major cybersecurity news of the past year and gives its predictions for 2019.
Analysis of a malicious code: in part 1, we defined what obfuscation was. Now we are going to move on to serious things with a more concrete case that we encounter every day, that is, a WORD file with a macro!
Return Path and Vade Secure strengthen partnership to optimize protection of 500 million email inboxes and thousands of senders
Working together for over 3 years, Return Path and Vade Secure continue to refine and enhance their solutions to identify legitimate advertisers and prevent cyberattacks
Paris, December 11, 2018 – Return Path, email intelligence market […]
At Vade Secure, we’re no strangers to spear phishing attacks. Our email security solutions identify these threats all the time for customers, thanks to our ability to detect not only exact sender or domain spoofing but visible alias spoofing and cousin domains. Recently, though, I came across a spear phishing attack that hit a little too close to home. That’s because I was the target!
In a preceding article, we conducted a study on a malicious email and noted that code could be executed when attachments were opened. Today we will focus on these malicious codes that are executed. We will come to understand what they are doing and what techniques are used to complicate the work of analysts and to bypass protections.
Email is known to be the vector of serious threats like phishing, which target credentials; spear-phishing, which usurps the identity of a colleague with the sole aim of inducing a fraudulent wire transfer or sharing of sensitive data; or malwares, which compromise the security of your information system.
Subscribe to our newsletter
- Alerts last cyber attacks (9)
- Anticipate Cyberattaks (31)
- Business performance (11)
- Choose my protection system (23)
- Email Security (49)
- How to protect yourself (17)
- Internet Service Provider (2)
- Malware – Ransomware (26)
- Office365 (15)
- Phishing (42)
- Spam – non-priority emails (11)
- Spear Phishing – Targeted Attacks (22)
- The new cyber attacks (39)
- Uncategorized (2)
- User Experience (3)
Recent tweets on @vadesecure
Attaque informatique mondiale : « C’est le ciment même d’Internet qui est visé » ▶️ Une attaque majeure, selon le s… twitter.com/i/web/status/1…3 months ago
- 3 months ago
- 3 months ago