Discover our blog

Spear Phishing

3 Types of Spear Phishing Emails and How MSPs Can Prevent Them

As a Managed Service Provider (MSP), it’s your job to keep your clients out of harm’s way. Unfortunately, in today’s...

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Email Security

Email Threat Detection: What MSPs Need to Know

The cybersecurity situation has escalated to a point where every organization needs to have advanced email security...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Malware - Ransomware

Ransomware Attacks: Why Email Is Still the #1 Delivery Method

Ransomware attacks have been on the rise since 2019 and peaked during the pandemic in 2021, when 68 percent of...

Research

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

MSP Cybersecurity

How to Incorporate Vade for M365 Into Your MSP Security Stack

Cybersecurity is everyone’s responsibility, but the public puts their trust in managed service providers (MSPs) and IT...