Discover our blog

Phishing

AI in Cybersecurity: How Hackers Are Helping Machines

Artificial intelligence (AI) is everywhere. Or is it? According to MIT Sloan Management Review, only one in 20...

Microsoft 365

6 Reasons You Need an Added Layer of Email Protection for Office 365

Businesses are migrating to Office 365 in huge numbers, and hackers have taken notice. As a result, businesses are...

Research

Vade Uncovers Ongoing Direct Deposit Spear Phishing Attacks

For some unfortunate employees, cybercriminals have found a way to make even payday a miserable experience. In a...

Microsoft 365

Maintaining a high bar for Office 365 email security

Even as new modes of messaging and collaboration proliferate, email remains the most common and effective form of...

Microsoft 365

Office 365 Strengths & Weaknesses: Protecting Your Email

How do you effectively protect Office 365? The issue has never been as critical as it is today. The latest edition of...

Email Security

Data leaks and security breaches: Cybercrime in 2018

What to expect in 2019? Cryptojacking on the wane, email scams, State APTs...

Malware - Ransomware

Malware Analysis, Part 2: Deobfuscating Code in a Word Macro

In part 1, we defined what code obfuscation is, what it could be used for, and we studied some code with a small amount...