Vade Secure Blog

Cybercrime Statistics: Top Threats and Costliest Scams of 2020

Phishing attacks doubled, COVID scams raged, and ransomware wreaked havoc in 2020. According to the FBI’s 2020 Internet Crime Repo...

April 08, 2021


1 min

Hackers are Bypassing Transport Layers and Depositing Spam via IMAP

Hackers are Bypassing Transport Layers and Depositing Spam via IMAP


December 15, 2020

Vade Secure has detected a wave of spam emails that are being directly deposited into mailboxes without passing through transport layers. The wave, which included 300,000 spam messages sent to a single customer in one day, has bee[...]

Email Security Predictions 2021: 6 Ways Hackers Will Target Businesses


December 10, 2020

It’s that time of year when we make our predictions about the biggest email security threats that will emerge in the coming year. Vade Secure’s experts weigh in on the threats that will have the biggest impact on businesses in 202[...]
Ransomware Payments

US Government Cracks Down on Businesses That Make Ransomware Payments


December 03, 2020

While businesses might be tempted to make ransomware payments to put a quick end to the nightmare of a ransomware attack, it’s one of the most dangerous decisions a business can make. Paying a ransom is no guarantee that a busines[...]

10 to 15 Percent of Black Friday Emails Are Malicious


November 26, 2020

Black Friday, the largest shopping event of the year that somehow is no longer a single day but weeklong event, brings with it an onslaught of promotional email. In the past week, Vade Secure has detected a wave of Black Friday em[...]

After the Phishing Simulation: Filling the Awareness Gap


November 19, 2020

A phishing simulation is a great way to gauge your users’ cybersecurity awareness. But what happens after the simulation? According to Verizon’s 2020 Data Breach Investigations Report, click rates increase and reporting rates drop[...]
Top 6 Phishing Trends of 2020

Top 6 Phishing Trends of 2020


November 12, 2020

Phishers are evolving and taking their attacks to new heights. While the ultimate goal of phishing remains the same, the top targets of spoofing are changing, and the methods of bypassing email filters are more sophisticated than [...]

Subscribe to our alerts for our latest blog posts