Monthly Threat Report July 2024: Snowflake(s) in July
Vade Blog
by Vade
6d ago
The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month of June 2024 ..read more
Visit website
Russia’s Notorious History of Hacking the Olympic Games
Vade Blog
by Vade
1M ago
As the world eagerly anticipates the upcoming Olympic Games in Paris, it’s crucial to address a persistent and increasingly sophisticated threat: cyberattacks. Russia, in particular, has a notorious history of targeting the Olympics with various forms of cyber aggression. In this article, we will look at Russia’s frankly very checkered past when it comes to hacking the games and provide tips on how to protect your organization during the 2024 Olympics ..read more
Visit website
Darkgate Pastejacking – Analysis and Breakdown of the Attack Chain
Vade Blog
by Vade
1M ago
Introduction ..read more
Visit website
Monthly Threat Report June 2024
Vade Blog
by Vade
1M ago
Introduction ..read more
Visit website
How Large Language Models Are Transforming Email Security
Vade Blog
by
3M ago
With the proliferation of Artificial Intelligence (AI) in the realm of email security, the battle against phishing and spear-phishing attacks requires increasing sophistication from security providers. Leveraging AI technologies has become a cornerstone of defense strategies, enabling rapid analysis of emails to identify potential scams with greater efficiency than ever before. Among the latest advancements reshaping this landscape are Large Language Models (LLMs ..read more
Visit website
Announcing Vade for Google Workspace: Advanced AI-Powered Email Security
Vade Blog
by Todd Stansfield
4M ago
Vade’s latest addition to its product portfolio is now live. Vade for Google Workspace extends our industry leading AI-driven threat detection and response to GWS, the second most popular productivity suite in the world. Interested Vade partners and customers can now take advantage of this powerful solution built exclusively for GWS ..read more
Visit website
Beware of Spear Phishing Scams Using Fake-Forwarded Emails
Vade Blog
by Vade Experts
4M ago
Vade has detected a new type of spear-phishing scam that can bypass email authentication protocols and detection by email filters. The exploit uses fake-forwarded emails to provide victims with basis and reason for complying with hacker’s demands, most often taking a financial action ..read more
Visit website
What is an Open Redirect Attack?
Vade Blog
by Todd Stansfield
4M ago
Impersonation is one of the most common and reliable tactics of any hacker. It naturally causes victims to lower their guard and overlook the subtle and not-so-subtle signs of malice. But how hackers go about impersonating legitimate entities—whether people or businesses—varies significantly. Numerous techniques exist to accomplish this feat—and among them is the practice of abusing an open redirect. Vade continues to see this technique used commonly in phishing scams that abuse legitimate brands and services ..read more
Visit website
Spear Phishing Attacks 2024: A Mid-Q1 Review
Vade Blog
by Todd Stansfield
5M ago
Vade recently analyzed a wave of spear-phishing attacks targeting organizations across EMEA and the US. The in-depth analysis reveals important findings about the current state of spear phishing, including the most common scams, impersonated employees, targeted roles, and more ..read more
Visit website
Data Theft and the Nefarious Market for Stolen Information
Vade Blog
by Vade Experts
5M ago
Data has become every organization’s most prized asset. It’s also emerged as their single greatest liability. Data theft, or the unauthorized extraction of information, presents big risks to companies of all sizes. From hefty financial losses to significant disruptions and downtime, lawsuits and regulatory fines, the consequences of data theft can be crippling. But they’re not only an organizational problem—they affect an ecosystem of stakeholders that includes consumers ..read more
Visit website

Follow Vade Blog on FeedSpot

Continue with Google
Continue with Apple
OR