Back to blog

Posts in the category
"Research"

Research

Q2 2022 Phishing and Malware Report: Malware Volumes Increase 21% in Q2

After a drastic increase in malware emails in March 2022, malware leveled off in April and then rebounded in both May...

Research

The Challenges of Phishing Detection (Part 2): Real-Time Webpage Analysis

This article is the second of a series of four related to the challenges that we face to detect phishing attacks at...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Research

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

Research

Microsoft 365 phishing email: how hackers are using a 20-year-old text trick

In the email security game between hackers and users, adversaries employ various forms of masquerading with a file to...

Research

Apple and Amazon Invoice Scams Mimic Ongoing Tech Support Scams

As holiday season approaches and shopping gets underway, online receipts are hitting inboxes around the world....