Back to blog

Posts in the category
"Spear phishing"

Spear Phishing

BEC Scam: How to Avoid Becoming a Victim

Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re...

Spear Phishing

3 Types of Spear Phishing Emails and How MSPs Can Prevent Them

As a Managed Service Provider (MSP), it’s your job to keep your clients out of harm’s way. Unfortunately, in today’s...

Spear Phishing

Are You in the Office? The Spear Phishing Attack You Won’t See Coming

Everyone has been the recipient of a phishing email. Most have been the target of an attempted spear phishing attack....

Spear Phishing

Spear Phishing Typology Detection added to Vade for M365

New in Vade for Microsoft 365, our spear phishing engine now classifies spear phishing emails according to threat...

Spear Phishing

BEC: The Impact of Foreign Languages on English-First Algorithms

Unlike other types of email threats, BEC (business email compromise) emails typically feature only a few lines of text,...


Defending against email spoofing

Email spoofing is a technique for forging an email header to trick recipients into believing a sender is a familiar...

Spear Phishing

Business Email Compromise: An Old Threat Finds New Targets

Business Email Compromise or BEC presents a radically more sophisticated version of the age-old “Nigerian Prince”...