Discover our blog

Email Security

Data leaks and security breaches: Cybercrime in 2018

What to expect in 2019? Cryptojacking on the wane, email scams, State APTs...

Malware - Ransomware

Malware Analysis, Part 2: Deobfuscating Code in a Word Macro

In part 1, we defined what code obfuscation is, what it could be used for, and we studied some code with a small amount...

Email Security

Return Path, Vade partner to protect 500M email inboxes

Working together for over 3 years, Return Path and Vade continue to refine and enhance their solutions to identify...

Malware - Ransomware

Malware Analysis, Part 1: Understanding Code Obfuscation Techniques

In a preceding article, we conducted a study on a malicious email and noted that code could be executed when...

Email Security

Deceptive spam: the painless attack which uses email marketing codes

Do we really know the threats conveyed by email?

Email is known to be the vector of serious threats like phishing,...

Phishing

What solutions do SOCs have to combat phishing?

Corporate security strategies have evolved to take into account their growing needs in terms of automation of...

Phishing

[Video] Real-Time Phishing Detection with Vade for Office 365

Vade for Office 365 is the only email security solution that sits inside Office 365, thanks to its native integration...