Back to blog

Posts in the category


Cyberthreats Target Black Friday: How to Protect Your Business and Employees

Despite this year’s economic and inflationary headwinds, forecasts predict Black Friday (a period spanning several...

MSP Cybersecurity

Clone Phishing: How to Protect Your Business from this Deceptive Cyberthreat

As a small-to-midsized business (SMB) or managed service provider (MSP), you fear this scenario. A clone phishing email...


Capital One Phishing Campaign Exploits Authentication App

A new phishing campaign impersonating Capital One attempts to steal personal identities rather than account...


Instagram Phishing Campaign: Hackers Exploit Social Verification

A new Instagram phishing campaign has surfaced recently. First discovered by Vade in late July, the scam exploits...


The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...


Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...