Revamping Email Security: Introducing SlashNext’s Enhanced Administration Portal CMS
In today’s fast-paced digital landscape, ensuring robust email security while maintaining operational efficiency is paramount. At SlashNext, we are dedicated to providing cutting-edge solutions to keep your organization secure from advanced messaging threats across email, mobile/SMS, and browser. We are excited to announce a major overhaul of our administration portal ... Read More
Revamping Email Security: Introducing SlashNext’s Enhanced Administration Portal CMS
In today’s fast-paced digital landscape, ensuring robust email security while maintaining operational efficiency is paramount. At SlashNext, we are dedicated to providing cutting-edge solutions to keep your organization secure from advanced messaging threats across email, mobile/SMS, and browser. We are excited to announce a major overhaul of our administration portal ... Read More
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Jimmy Lin | SlashNext Threat Lab | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it has permeated various communication channels, including SMS, WhatsApp, and collaboration tools like Microsoft Teams, Slack and Zoom. This ... Read More
Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach
Jimmy Lin | SlashNext Threat Lab | | bec, Dave Gruber, Email Protection, Enterprise Strategy Group, ESG, generative AI, Industry Report, malicious links, smishing, social engineering, spear-phishing, WormGTPT
In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6-10 sanctioned apps on any given day. And that’s not even counting the unsanctioned tools that fly under IT’s ... Read More
Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach
Jimmy Lin | SlashNext Threat Lab | | bec, Dave Gruber, Email Protection, Enterprise Strategy Group, ESG, generative AI, Industry Report, malicious links, smishing, social engineering, spear-phishing, WormGTPT
In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6-10 sanctioned apps on any given day. And that’s not even counting the unsanctioned tools that fly under IT’s ... Read More
The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess
Jimmy Lin | SlashNext Threat Lab | | bec, business email compromise, Cloud Email Security, Email Protection, Industry Report, tolly group, tolly report
In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors, with zero-hour Business Email Compromise (BEC) and advanced phishing attacks posing significant risks to organizations. A recent independent study by The Tolly Group, commissioned by SlashNext, highlights the company’s Gen AI powered Integrated Cloud Email Security ... Read More
Understanding Credential Phishing
Jimmy Lin | SlashNext Threat Lab | | credential phishing, credential stealing, CTO Corner, Email Protection, Ransomware, UnitedHealth
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential phishing is the root cause of many breaches, including the recent ransomware breach at UnitedHealth subsidiary Change Healthcare ... Read More
DoH and Phishing Risks. What You Need to Know Now
Jimmy Lin | SlashNext Threat Lab | | Browser Phishing Protection, Endpoint security, Mobile Phishing Protection, Phishing
As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it has made employees and consumers more aware of the potential privacy risks to their digital footprint. DNS over HTTPS (DoH) ... Read More
SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On
Jimmy Lin | SlashNext Threat Lab | | bec, browser isolation, browser phishing detection, Endpoint security, internet isolation technology, Phishing, Web Isolation
Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their security stacks. It is often marketed as email isolation, not to be confused with email URL rewriting, but ... Read More
Browser Extensions, an Overlooked Phishing Attack Vector
Jimmy Lin | SlashNext Threat Lab | | Endpoint security, malicious extensions, Phishing, rogue browser extensions
As users continue to leverage browser extensions to save time and increase productivity it is attracting the attention of cybercriminals. Learn how malicious extensions are making their way into the official stores and how to stay safe ... Read More