™

Expand Your MSSP Portfolio with 360 Protection Across Mobile, Email, and Web

As security threats become progressively sophisticated, IT organizations are looking to managed security services to provide trusted security solutions to fill the gaps. While the demand is high for MSSPs, the ability to offer advanced security programs that are innovative and cost-effective is a challenge. To help MSSPs meet this ... Read More

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, the applications SOARs ingest are just as critical as the tool itself, and this ... Read More

Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security

SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our anti-phishing solutions. One of its best features is preemptive threat hunting that allows organizations to stay ahead of the latest threats and operationalize enhanced phishing protection in real-time. Recently, SEER ... Read More
Covid-19 Fears Present Opportunities for New Phishing Campaigns

Covid-19 Fears Present Opportunities for New Phishing Campaigns

Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever public emotions are running high, cybercriminals try to take advantage of human curiosity, fear, anxiety, and the instinct to react with a sense of urgency. Always ready, attackers employ scareware ... Read More

New Remote Worker Shift Requires a Robust Phishing Protection Toolbox

| | Phishing
With the COVID-19 pandemic spreading throughout the United States, it’s likely that most US workers will find themselves working from home at some point. And while technology today such as web conferencing, robust mobile and tablet devices, laptop and desktops with access to corporate networks can help facilitate this new ... Read More

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and March 2019, 31,429 total threats were reported by end users after delivery to the inbox, ... Read More
SMiShing is a Growing Mobile Phishing Threat Vector (That Needs Your Attention)

SMiShing is a Growing Mobile Phishing Threat Vector (That Needs Your Attention)

Protecting mobile users from today’s phishing threats is a huge and growing challenge for IT security teams. Employees increasingly rely on mobile devices as part of their everyday business and personal tasks. And with the popularity of mobile BYOD, unclear security policies, lack of full-time VPN tunneling, and relatively poor ... Read More
A close up of a sign  Description automatically generated

Slow Response Times to Blame for Phishing Attack Success on Organizations

Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set up and take down phishing attacks within minutes, making it very hard for current defenses to identify the problem before users succumb to a scam. The major types of phishing ... Read More

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

If you’re in the IT security space, you no doubt realize that phishing remains a constant threat. Exploiting the human attack surface is at the start and heart of most cybersecurity breaches, it often goes undetected until too late, requires a big investment of time and money to defend, and ... Read More

Rethinking Endpoint and Mobile Security for Remote Workers

With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling enables remote users to benefit from most perimeter protections. However, full-time VPN enforcement can be difficult. Users may not always ... Read More