QR Code Phishing

Malicious Use of QR Codes on the Rise Through Quishing Attacks

| | Email Protection
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The QR code’s design allowed it to store more information than the traditional barcodes that were used and could be quickly ... Read More
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace with the new highly sophisticated AI phishing techniques used for Business Email Compromise (BEC), smishing, link and file-based ... Read More
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning tools to disperse misinformation for cybercriminal scams. It doesn’t take much for an audio recording of a voice ... Read More
G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers each year. This recognition is decided by actual customer feedback on features and functionality as compared to competitive alternatives.  Quarterly, ... Read More
Five Types of Business Email Compromise Attacks and How to Prevent Them

Five Types of Business Email Compromise Attacks and How to Prevent Them

In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) latest 2022 report, which emphasized a steep and significant rise in Business Email Compromise (BEC) growth. The FBI documented victim’s adjusted losses reaching over $2.7 billion for the year. The FBI added ... Read More
Latest FBI IC3 Report Reveals BEC and Crytpo Scams Top the List of the $10.3 Billion Losses in 2022

Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022

| | bec
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of Business Email Compromise (BEC) like 2021, but also reveals the growth of investment scams, which exceeded BEC losses ... Read More
March Madness

The Downside to March Madness – a Busted Bracket and a Data Breach

Back in the 1930s, March Madness was used to describe the excitement and frenzy surrounding an Illinois high school basketball tournament. Over the years, the term has become associated with the frenetic NCAA (National Collegiate Athletic Association) Men’s Basketball Tournament, which starts this week throughout the country. The highly anticipated ... Read More
The SEG Conundrum. What's Right for My Organization?

The SEG Conundrum. What’s Right for My Organization?

| | bec, Email Protection
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious emails from arriving in users’ mailboxes. The early SEGs were designed to scan incoming and outgoing email messages for viruses, malware, and other security threats. They were on premises and ... Read More
Chatbot Wars and the Battle Between Good and Evil

Chatbot Wars and the Battle Between Good and Evil

| | bec
Chatbot wars are gearing up for full throttle – with Microsoft, Google, and potentially Apple leading the race. Microsoft-backed OpenAI has the first-mover lead in the arms race with the fastest growing tool ever. But Google and Apple also have massive amounts of data and billions of dollars to eventually ... Read More
The Truth About Why Malicious Links Get Through Security

The Truth About Why Malicious Links Get Through Security

KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon Web Services), Wix, GoDaddy and many others, and these services are thought safe by many security services. The malicious links are open doors to breaches, which aren’t just the loss of critical business or customer data, ... Read More

Secure Guardrails