Back to blog

Posts in the category
"Phishing"

Phishing

Cyberthreats Target Black Friday: How to Protect Your Business and Employees

Despite this year’s economic and inflationary headwinds, forecasts predict Black Friday (a period spanning several...

MSP Cybersecurity

Clone Phishing: How to Protect Your Business from this Deceptive Cyberthreat

As a small-to-midsized business (SMB) or managed service provider (MSP), you fear this scenario. A clone phishing email...

Phishing

Capital One Phishing Campaign Exploits Authentication App

A new phishing campaign impersonating Capital One attempts to steal personal identities rather than account...

Research

Instagram Phishing Campaign: Hackers Exploit Social Verification

A new Instagram phishing campaign has surfaced recently. First discovered by Vade in late July, the scam exploits...

Research

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...