Vade Blog
235 FOLLOWERS
Get the latest insights and analysis on global email threats, plus tips and tools from our experts on how to protect your business from attacks. Vade is a predictive email security solution to protect corporations against phishing, malware, spear phishing, and spam.
Vade Blog
6d ago
The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month of June 2024 ..read more
Vade Blog
1M ago
As the world eagerly anticipates the upcoming Olympic Games in Paris, it’s crucial to address a persistent and increasingly sophisticated threat: cyberattacks. Russia, in particular, has a notorious history of targeting the Olympics with various forms of cyber aggression. In this article, we will look at Russia’s frankly very checkered past when it comes to hacking the games and provide tips on how to protect your organization during the 2024 Olympics ..read more
Vade Blog
3M ago
With the proliferation of Artificial Intelligence (AI) in the realm of email security, the battle against phishing and spear-phishing attacks requires increasing sophistication from security providers. Leveraging AI technologies has become a cornerstone of defense strategies, enabling rapid analysis of emails to identify potential scams with greater efficiency than ever before. Among the latest advancements reshaping this landscape are Large Language Models (LLMs ..read more
Vade Blog
4M ago
Vade’s latest addition to its product portfolio is now live. Vade for Google Workspace extends our industry leading AI-driven threat detection and response to GWS, the second most popular productivity suite in the world. Interested Vade partners and customers can now take advantage of this powerful solution built exclusively for GWS ..read more
Vade Blog
4M ago
Vade has detected a new type of spear-phishing scam that can bypass email authentication protocols and detection by email filters. The exploit uses fake-forwarded emails to provide victims with basis and reason for complying with hacker’s demands, most often taking a financial action ..read more
Vade Blog
4M ago
Impersonation is one of the most common and reliable tactics of any hacker. It naturally causes victims to lower their guard and overlook the subtle and not-so-subtle signs of malice. But how hackers go about impersonating legitimate entities—whether people or businesses—varies significantly. Numerous techniques exist to accomplish this feat—and among them is the practice of abusing an open redirect. Vade continues to see this technique used commonly in phishing scams that abuse legitimate brands and services ..read more
Vade Blog
5M ago
Vade recently analyzed a wave of spear-phishing attacks targeting organizations across EMEA and the US. The in-depth analysis reveals important findings about the current state of spear phishing, including the most common scams, impersonated employees, targeted roles, and more ..read more
Vade Blog
5M ago
Data has become every organization’s most prized asset. It’s also emerged as their single greatest liability. Data theft, or the unauthorized extraction of information, presents big risks to companies of all sizes. From hefty financial losses to significant disruptions and downtime, lawsuits and regulatory fines, the consequences of data theft can be crippling. But they’re not only an organizational problem—they affect an ecosystem of stakeholders that includes consumers ..read more