Discover our blog

Microsoft 365

Maintaining a high bar for Office 365 email security

Even as new modes of messaging and collaboration proliferate, email remains the most common and effective form of...

Microsoft 365

Office 365 Strengths & Weaknesses: Protecting Your Email

How do you effectively protect Office 365? The issue has never been as critical as it is today. The latest edition of...

Email Security

Data leaks and security breaches: Cybercrime in 2018

What to expect in 2019? Cryptojacking on the wane, email scams, State APTs...

Malware - Ransomware

Malware Analysis, Part 2: Deobfuscating Code in a Word Macro

In part 1, we defined what code obfuscation is, what it could be used for, and we studied some code with a small amount...

Email Security

Return Path, Vade partner to protect 500M email inboxes

Working together for over 3 years, Return Path and Vade continue to refine and enhance their solutions to identify...

Malware - Ransomware

Malware Analysis, Part 1: Understanding Code Obfuscation Techniques

In a preceding article, we conducted a study on a malicious email and noted that code could be executed when...

Email Security

Deceptive spam: the painless attack which uses email marketing codes

Do we really know the threats conveyed by email?

Email is known to be the vector of serious threats like phishing,...