Astra Group Credential Stealing Threat

Threats Hiding Behind Trusted Microsoft Domains

Throughout 2021 there was a growing increase in cyber threats hosted on legitimate services like Microsoft Teams, OneDrive, SharePoint, and OneNote to deliver phishing campaigns. These domains’ trusted reputation enables cybercriminals to easily evade current detection technologies using domain reputation and blocklists like SEG, proxy, SASE, and endpoint security tools ... Read More

Top 3 Reasons Multi-Channel Phishing is a Real and Present Danger Now

Multi-channel phishing is fast becoming the preferred way for cybercriminals to deliver successful attacks because they know there are gaps in cyber defenses. While organizations focus on protecting email from phishing and malware, there are gaps in protection defenses for other channels. Leaving other communication channels with limited protection is ... Read More
™

The Future of Browser Security Lies in AI and Machine Learning

With software becoming more secure and adept at defending against malware, the cyberattack threat environment has shifted towards phishing. But unlike in the past, where these attacks were predominantly email-driven, hackers are now focused on multiple channels such as mobile devices, apps, and web pages. Since phishing is a human ... Read More
Zoom Phishing Attack

Human Hacking and Multi-Channel Phishing is Surging

Human hacking is a modern way to think about phishing in its entirety, which is anything malicious that reaches a user to steal credentials, data, or financial information. By focusing on phishing as an email problem or a spam problem is giving hackers the upper hand. Today, only protecting email ... Read More

Social Engineering Threats Rose 270% in 2021 – Indicating a Shift to Multi-Channel Phishing Attacks as Apps and Browsers Move to the Cloud

Humans are the most vulnerable cybersecurity entry points into an organization. By moving completely to the cloud, apps and browsers are all humans need to communicate with work, family, and friends. In the Human Hacking report recently published by SlashNext Threat Labs, data shows phishing attacks rose 51% over 2020 (a record-breaking year), and ... Read More

Spear Phishing from Trusted Sites Bypassing SEGs 65% of the Time

The rise of well-crafted spear phishing is the leading factor in the success of phishing attacks in 2021. In an environment where cybercriminals use automation and AI to increase the likelihood of compromising a target, the once-reliable security strategies of Secure Email Gateways (SEGs), firewalls, and other anti-phishing protections are ... Read More
Ad Network Phishing Lure Page

Why Your Security Strategy Needs to Think More About the Browser to stop Ransomware

Cybercriminals are Open for Business and Ransomware is the Daily Special When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: 80% of web application attacks result in credential stealing, Verizon 2021 DBIR (Data Breach Investigations Report) which is ... Read More
Phish Stories 5: The Security and Privacy Conundrum in a BYOD World

Overcoming the Corporate Security and Employee Privacy Challenge

| | remote working
The shift to remote working has blurred the lines between people’s business and personal lives. With more organizations adopting BYOD (bring your own device) policies, the challenge now is how to protect employees best as they access corporate resources while guaranteeing the privacy of their personal activities. This is the ... Read More

SlashNext Reinvents Incident Response with Cortex XSOAR

The current security landscape is filled with targeted attacks, including sophisticated phishing and spear-phishing campaigns, and as many threat actors as defenders. Beyond stealing credentials, attackers are interested in compromising systems and data to any advantage they can gain, and security teams are struggling to maintain organizational defenses in today’s ... Read More

A Swarm of Ransomware Attacks Highlights the Need for High-Quality Threat Detection at the Start of the Attack Chain

| | Phishing, Ransomware
Ransomware is insidious. It’s a treacherous and crafty way to terrorize individuals, communities, and businesses. It’s also an industry with multiple players, each playing a part in a chain that results in a big payday. Ransomware-as-a-Service (RaaS) groups like DarkSide, REvil, and others use automation, personal information, and the low ... Read More