Back to blog

Posts in the category
"Phishing"

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Research

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

Phishing

Phishers Impersonate Maersk to Exploit Global Supply Chain Chaos

Several waves of phishing emails impersonating Maersk have targeted more than 18,000 recipients, 13,000 recipients, and...

MSP Cybersecurity

8 anti-phishing tips for MSPs

Security is tough to prioritize for clients and managed service providers (MSPs) alike. Paying for cybersecurity can...
Phishing

Phishing attack examples: campaign season is cybercrime season

As French President Emanuel Macron prepared to run for re-election this year, his campaign’s cybersecurity staff most...

Phishing

The Art of Deception in Social Media Phishing

The growth of social media phishing can be largely attributed to the broadening reach of social media companies like ...