Back to blog

Posts in the category
"Research"

Phisher's Favorites

Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Research

Hacker Impersonates TrustWallet in Crypto Phishing Scam

On June 12, Vade observed a wave of more than 50,000 phishing emails sent from a malicious Zendesk account. In one...

Research

The Challenges of Phishing Detection (Part 1)

This article is the first of a series of three related to the challenges that we faced to detect phishing attacks at...

Research

Microsoft 365 phishing email: how hackers are using a 20-year-old text trick

In the email security game between hackers and users, adversaries employ various forms of masquerading with a file to...

Research

Apple and Amazon Invoice Scams Mimic Ongoing Tech Support Scams

As holiday season approaches and shopping gets underway, online receipts are hitting inboxes around the world....

Research

Five Years Later, Ashley Madison Data Breach Fuels New Extortion Scam

In our email security predictions 2020, Vade Tech Evangelist Sebastien Gest posited that data breaches in 2019 would...

Research

3 Ways Cybercriminals Hack into Netflix Accounts

Today’s Internet users aren’t the surfers of the past: we are consumers, and hackers understand this. When one person...