Back to blog

Posts in the category
"Email security"

Email Security

Announcing Cross-Tenant User-Reported Emails Triage and Remediation

Vade is pleased to announce the release of cross-tenant user-reported emails triage and remediation. Reported emails...

Email Security

Email Threats and the Weaponization of AI: how organizations can protect themselves

Artificial intelligence (AI) has long served as an equalizer in cybersecurity. Hackers possess an inherent advantage in...

Email Security

Keylogger Attacks: What They Are and How to Prevent Them

Keylogger attacks use a common and especially invasive type of malware to exploit victims. From harvesting user...

Email Security

Messy Breakups: A History of Hacker Relationships Gone Bad

The rise of sophisticated cybercriminal organizations such as Wizard Spider and LockBit are creating havoc for...

Phishing

What is a Vishing Attack, How Do You Defend Against It?

Big companies like Cisco and Twilio have grabbed headlines after recently falling victim to a vishing attack, but these...

Spear Phishing

BEC Scam: How to Avoid Becoming a Victim

Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re...

Malware - Ransomware

Data Exfiltration: Why Ransomware is About More Than the Ransom

If you’re like most organizations, the term “ransomware” conjures up nightmares of hackers infiltrating your network,...