Threat Analysis Instagram Phishing Campaign: Hackers Exploit Social Verification By Todd Stansfield, on September 01, 2022 A new Instagram phishing campaign has surfaced recently. First discovered by Vade in late July, the scam exploits... Read more
Phishing The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis By Sébastien Goutal, on August 18, 2022 This article is the second of a series of four related to the challenges that we face to detect phishing attacks at... Read more
Phisher's Favorites Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks By Natalie Petitto, on July 26, 2022 Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing... Read more
Threat Analysis Hacker Impersonates TrustWallet in Crypto Phishing Scam By Natalie Petitto, on June 30, 2022 On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one... Read more
Phishing The Challenges of Phishing Detection (Part 1) By Sébastien Goutal, on June 09, 2022 This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at... Read more
Phishing Phishers Impersonate Maersk to Exploit Global Supply Chain Chaos By Natalie Petitto, on May 18, 2022 Several waves of phishing emails impersonating Maersk have targeted more than 18,000 recipients, 13,000 recipients, and... Read more