Discover our blog

Email Security

Choosing an Email Security Solution: 5 Key Questions to Ask

Email is a top attack vector and one of your clients’ biggest points of vulnerability to cyber threats. If you’re in...

Malware - Ransomware

Malware Analysis: Tips, Tools, and Techniques

Malware often contains features designed to evade detection by antivirus and other email security tools. In this...

Email Security

Productivity Suite Security: A New Approach

Productivity suites like Microsoft 365 and Google Workspace have transformed workplace collaboration. Today, more than ...

Malware - Ransomware

Ransomware Prevention: Protecting Against the #1 Source of Infection

Seven in 10 businesses were the victim of a ransomware attack in 2022, according to a global survey by Statista, the...

MSP Cybersecurity

Why Users Should Report Suspicious Emails, and How to Manage Them When They Do

Users are the weakest link when it comes to cybersecurity. That’s why it may seem surprising that your cybersecurity...

Microsoft 365

Microsoft Cybersecurity: Defending Your Top Vulnerability

Microsoft 365 is the world's most popular productivity suite with more than 345 million users. Yet its popularity has...

Research

New Phishing Attack Leverages Google Translate and IPFS Decentralized Network

Vade has detected a new phishing campaign that impersonates Wallet Connect—an open-source application for connecting...