Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, the applications SOARs ingest are just as critical as the tool itself, and this ... Read More

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in this way: Messaging – 17% Social Media – 16% Gaming – 11% Productivity Apps – 10% Others, including news and ... Read More

5 Ways Phishing Attacks Manipulate Mobile Devices Outside Email

Given the current demand for remote working, phishing attacks on mobile devices are particularly worrisome for security professionals. There is only a 30% penetration of threat defense on mobile devices, according to Gartner’s Market Guide for Mobile Threat Defense. Yet most mobile device users still think they have the protection ... Read More

5 Ways URL Analysis and Enrichment Benefits Managed Service Providers

Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers. Nearly half of all survey respondents (47%) reported spending up to 10 minutes per incident researching URLs. This approach is costly and dangerous for large organizations because social engineering attacks ... Read More
™

Expand Your MSSP Portfolio with 360 Protection Across Mobile, Email, and Web

As security threats become progressively sophisticated, IT organizations are looking to managed security services to provide trusted security solutions to fill the gaps. While the demand is high for MSSPs, the ability to offer advanced security programs that are innovative and cost-effective is a challenge. To help MSSPs meet this ... Read More

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, the applications SOARs ingest are just as critical as the tool itself, and this ... Read More

Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security

SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our anti-phishing solutions. One of its best features is preemptive threat hunting that allows organizations to stay ahead of the latest threats and operationalize enhanced phishing protection in real-time. Recently, SEER ... Read More
Covid-19 Fears Present Opportunities for New Phishing Campaigns

Covid-19 Fears Present Opportunities for New Phishing Campaigns

Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever public emotions are running high, cybercriminals try to take advantage of human curiosity, fear, anxiety, and the instinct to react with a sense of urgency. Always ready, attackers employ scareware ... Read More

New Remote Worker Shift Requires a Robust Phishing Protection Toolbox

| | Phishing
With the COVID-19 pandemic spreading throughout the United States, it’s likely that most US workers will find themselves working from home at some point. And while technology today such as web conferencing, robust mobile and tablet devices, laptop and desktops with access to corporate networks can help facilitate this new ... Read More

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and March 2019, 31,429 total threats were reported by end users after delivery to the inbox, ... Read More