Exploring the World of AI Jailbreaks
Explore AI jailbreaking and discover how users are pushing ethical boundaries to fully exploit the capabilities of AI chatbots. This blog post examines the strategies employed to jailbreak AI systems and the role of AI in cybercrime. The Emergence of AI Jailbreaks In recent years, AI chatbots like ChatGPT have ... Read More
CISOs Increasingly Concerned About Mobile Threats
A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly concerned about mobile threats targeting employees and the impact to their organization. The rise of smishing, spam text messages and ... Read More
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security
The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these devices have made them enticing targets for hackers. The utilization of personal devices for work introduces security vulnerabilities ... Read More
State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of phishing attacks compared to 2021. The latest State of Phishing Report findings highlights ... Read More
Expert Guide to Microsoft 365 Email Threat Protection
With the demands of the modern workforce, there’s been an increased use of native cloud email protection, like Microsoft 365, in the last 12 months. This has led many security professionals to ask if Microsoft 365 Defender can provide enough threat coverage to protect their organization. They wonder if they ... Read More
Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites
The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These attacks target shoppers anxiously awaiting the amazing offers and discounts revealed during the two-day sale, and bad actors are ready to take advantage of the excitement. Right now, SlashNext has tens of thousands ... Read More
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) is a term used to describe a cyber-attack where the cybercriminal comes between with user and their application. In these attacks, a hacker will inject code to hijack the application to steal credentials or open a backdoor to their network. These attacks are very dangerous ... Read More
Phishing + Ransomware—Why Multi-Channel Protection is Essential to Stop Both
When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: Ransomware has continued its upward trend with an almost 13%increase–a rise as big as the last five years combined according to Verizon 2022 DBIR(Data Breach Investigations Report) The human ... Read More
Getting Intelligent About Browser Security
Fixing browser security with artificial intelligence Had you told me 30 years ago the first web browser would be the ancestor of most software interfaces, I’d have been skeptical. Of course, that was before most of us had an inkling of what the web would become. Even with that hindsight, ... Read More
Beware! It’s Not the IRS Texting, Emailing, or Calling You
There are many compelling reasons why tax returns are valuable to hackers, but all are related to monetary gain. Tax returns are dense with personal information, including social security numbers, dependents’ PII, property addresses, and bank account information. This information can be sold on the dark web or used in ... Read More