Discover our blog

Alert

Log4Shell Remote Code Execution Vulnerability

Vade is aware of the zero-day vulnerability in the open-source Apache Log4Shell (Log4j) utility, which could allow a...

Email Security

Email Security Predictions 2022: 4 Ways Hackers Will Target Businesses

It’s that time of year when we make our predictions about the biggest email security threats that will emerge in the...

Research

Apple and Amazon Invoice Scams Mimic Ongoing Tech Support Scams

As holiday season approaches and shopping gets underway, online receipts are hitting inboxes around the world....

MSP Cybersecurity

Cybersecurity Software: Why Ease of Use Is Essential

A staple of today’s digital age is the rapid pace of change in almost every field, but even more so when it comes to...

MSP Cybersecurity

Scaling Managed Security Services

Cybersecurity presents one of the biggest opportunities for growth for MSPs. Scaling managed security services,...

Email Security

Threat Intel & Investigation Is Now Available in Free Beta

Disparate cybersecurity data can leave your security team in the dark. Not only that, but monitoring and managing...

Phishing

Phishing Awareness Training: 8 Things Your Employees Should Understand

This article was originally published in 2019 and has been updated with new content.

Not long ago, phishing was...