Introducing SlashNext Mobile and Browser Phishing Protection
Lightweight, cloud-powered endpoint solutions protect remote users from the new multi-vector phishing threat landscape At SlashNext, protecting organizations from advanced phishing threats isn’t a part-time job. It’s our full-time focus. As we’ve evolved our award-winning anti-phishing solutions over the years, we’ve increasingly heard about the need to better protect remote ... Read More
The Current Challenges SOCs Face and How to Help
Security operations centers (SOCs) seem to be in a state of flux; where balancing […] ... Read More
Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing
As we’ve blogged about before, cybercriminals are increasingly leveraging legitimate commercial infrastructure sites to […] ... Read More
The Threat Detection Deficit – Microsoft Office 365 ATP Raises the Stakes
A recent Dark Reading article, based on IRONSCALES’ research, found that Microsoft Office 365 […] ... Read More
How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure
In a recent blog we discussed Why Organizations Need to Take Phishing Threats Against […] ... Read More
How URL Filtering Fails Users (and What You Should Do)
URL filtering is a feature of most Next-Generation Firewalls (NGFW) and some Web Proxies. […] ... Read More
6 Evasive Phishing Tactics Most Cybersecurity Solutions Miss
It seems today that threat actors can access almost any tool they need to […] ... Read More
8 ‘Must-Haves’ that Today’s Security Policies Need to Include
As we’ve blogged about previously, the security response to phishing attacks and other cybersecurity […] ... Read More
7 Sophisticated Cyber-Attacks that are Growing in 2019
Shadow IT and the growth in applications at use in the work environment, together […] ... Read More
4 Infamous Social Engineering Attacks That Real-Time Protection Would Have Stopped
Threat actors are constantly evolving their methods to go after the human attack surface […] ... Read More