Discover our blog

Email Security

Why Invisibility Is Essential in Supply Chain Security

The SolarWinds breach discovered in December 2020 was a stunning feat of cyber warfare that went undetected for nine...

Phishing

20 Years After the Love Bug Virus: Too Many Phish in the Sea

Are you my secret admirer? That was the question millions of people were asking 20 years ago when the Love Bug virus...

Phisher's Favorites

A Year Like No Other: Phishers’ Favorite Brands of 2020

COVID-19 helped drive a continuous onslaught of phishing attacks in 2020. From the World Health Organization (WHO) to...

Malware - Ransomware

Emotet Is Out of Business

A coordinated effort between law enforcement agencies in the US, Canada, and Europe has brought an end to Emotet. On...

Email Security

Remote Images Are Pushing Email Filters to Their Limits

Phishing emails impersonating popular brands like Microsoft or PayPal need visual content to be successful. From brand...

Spear Phishing

BEC: The Impact of Foreign Languages on English-First Algorithms

Unlike other types of email threats, BEC (business email compromise) emails typically feature only a few lines of text,...

Alert

Spam Emails: Hackers are Bypassing Transport Layers via IMAP

Vade has detected a wave of spam emails that are being directly deposited into mailboxes without passing through...