Discover our blog

Phishing

What is a Vishing Attack, How Do You Defend Against It?

Big companies like Cisco and Twilio have grabbed headlines after recently falling victim to a vishing attack, but these...

MSP Cybersecurity

Managed Security Services: 4 New Year’s Resolutions for Your MSP

The New Year offers hope for positive change, a chance to fix our shortcomings and achieve our greatest aspirations....

MSP Cybersecurity

The Supply Chain Attack: Why MSPs Are Especially Vulnerable

In July 2021, software company Kaseya VSA became the victim of a supply chain attack. REvil exploited a zero-day...

Spear Phishing

BEC Scam: How to Avoid Becoming a Victim

Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re...

MSP Cybersecurity

What is a Brute Force Attack? Common Types and How to Prevent Them

According to IBM’s Cost of a Data Breach 2022 Report, stolen or compromised account credentials are the most common...

Vade News

Announcing Reported Emails for Vade for M365

Vade is pleased to announce the release of Reported emails, a new feature of Vade for M365. With this latest...

Research

The Challenges of Phishing Detection (Part 3): Improve Accuracy with Hybrid Models

This article is the third of a series of four related to the challenges that we face to detect phishing at scale with...