Discover our blog

Research

IC3 Report 2022: 5 Key Takeaways About the State of Cybercrime

Each year, the FBI’s Internet Crime Complaint Center (IC3) publishes annual figures on the Internet crimes publicly...

Email Security

Email Threats and the Weaponization of AI: how organizations can protect themselves

Artificial intelligence (AI) has long served as an equalizer in cybersecurity. Hackers possess an inherent advantage in...

Phisher's Favorites

Phishers’ Favorites 2022 Year-in-Review: Google Phishing Sharply Increases

Today, Vade released our annual Phishers’ Favorites Year-in-Review report. For the report, Vade analyzed 274,636...

Email Security

Keylogger Attacks: What They Are and How to Prevent Them

Keylogger attacks use a common and especially invasive type of malware to exploit victims. From harvesting user...

Phishing

Executive Phishing: 3 Common Attacks

Executive phishing is a top cybersecurity concern for organizations of all sizes, contributing to the more than $43...

Email Security

Messy Breakups: A History of Hacker Relationships Gone Bad

The rise of sophisticated cybercriminal organizations such as Wizard Spider and LockBit are creating havoc for...

Research

Q4 2022 Malware and Phishing Report: Phishing Volumes Increase 36% QoQ

Vade’s Q4 2022 Malware and Phishing Report reveals a sharp increase in cyberthreats, with phishing volumes rising 36%...