Discover our blog

Phishing

How Data Leaks Unleash Targeted Phishing Attempts

When a large data leak is reported in the news, most of us worry about highly sensitive data. But it’s not all about...

Email Security

DMARC: The Limitations of Sender Authentication

Both phishing and spear phishing emails are designed to deceive victims into believing they’re receiving an email from...

Malware - Ransomware

Ransomware examples:  recent attacks and how to prevent them

Ransomware attacks are on the rise, with hackers shifting their focus from enterprises to MSPs and MSP clients. In Q3...

Phishing

5 Phishing Scams and How to Spot Them

Phishing scams are getting harder to spot due to increasingly sophisticated techniques designed to bypass...

Email Security

Romance Scams: The Email Threat That Breaks Hearts and Banks

Since the large adoption of the internet, the online dating industry moved to set a new standard in the way we find...

Phisher's Favorites

Phishers’ Favorites: Note phishing increases; banks targeted

Today, we published our Phishers’ Favorites report for Q4 2019. Now in its seventh edition, Phishers’ Favorites ranks...

Research

Five Years Later, Ashley Madison Data Breach Fuels New Extortion Scam

In our email security predictions 2020, Vade Tech Evangelist Sebastien Gest posited that data breaches in 2019 would...