Back to blog

Posts in the category
"Phishing"

Threat Analysis

Instagram Phishing Campaign: Hackers Exploit Social Verification

A new Instagram phishing campaign has surfaced recently. First discovered by Vade in late July, the scam exploits...

Phishing

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Threat Analysis

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Phishing

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

Phishing

Phishers Impersonate Maersk to Exploit Global Supply Chain Chaos

Several waves of phishing emails impersonating Maersk have targeted more than 18,000 recipients, 13,000 recipients, and...