Syndicated Blog

SlashNext
Complete Generative AI Security for Email, Mobile, and Browser
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...