Discover our blog

Spear Phishing

BEC: The Impact of Foreign Languages on English-First Algorithms

Unlike other types of email threats, BEC (business email compromise) emails typically feature only a few lines of text,...

Alert

Spam Emails: Hackers are Bypassing Transport Layers via IMAP

Vade has detected a wave of spam emails that are being directly deposited into mailboxes without passing through...

Email Security

Email Security Predictions 2021: 6 Ways Hackers Will Target Businesses

It’s that time of year when we make our predictions about the biggest email security threats that will emerge in the...

Malware - Ransomware

Ransomware payment: US Government Cracks Down on Businesses

While businesses might be tempted to make a ransomware payment to put a quick end to the nightmare of a ransomware...

Email Security

10 to 15 Percent of Black Friday Emails Are Malicious

Black Friday, the largest shopping event of the year that somehow is no longer a single day but weeklong event, brings...

Phishing

After the Phishing Simulation: Filling the Awareness Gap

A phishing simulation is a great way to gauge your users’ cybersecurity awareness. But what happens after the...

Phishing

Top 6 Phishing Trends of 2020

Phishers are evolving and taking their attacks to new heights. While the ultimate goal of phishing remains the same,...