Back to blog

Posts in the category
"Phishing"

Phishing

What is a Vishing Attack, How Do You Defend Against It?

Big companies like Cisco and Twilio have grabbed headlines after recently falling victim to a vishing attack, but these...

Research

The Challenges of Phishing Detection (Part 3): Improve Accuracy with Hybrid Models

This article is the third of a series of four related to the challenges that we face to detect phishing at scale with...

Phishing

Cyberthreats Target Black Friday: How to Protect Your Business and Employees

Despite this year’s economic and inflationary headwinds, forecasts predict Black Friday (a period spanning several...

Phishing

Capital One Phishing Campaign Exploits Authentication App

A new phishing campaign impersonating Capital One attempts to steal personal identities rather than account...

Research

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...