Syndicated Blog

SlashNext
Complete Generative AI Security for Email, Mobile, and Browser
The Growing Menace of Obfuscated Phishing Scams

From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams

In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of ...
Security Training Will Not Save You From Phishing Attacks

Think Security Training Will Save You From Phishing Attacks? Think Again!

What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics ...
FBI IC3 2023 report shows record year for cybercrime

Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report

Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in losses The 2023 FBI IC3 report reveals not just numbers but narratives that underscore the adaptability and cunning ...
Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have uncovered a dangerous new type of cyberattack in the wild that uses ...
SMS Phishing Threats

SMS Gateways Allow Cybercriminals to Flood Phones With SMS Phishing Messages For Just €0.004 ($0.0044) Each

| | Mobile, Phishing
Our team has been investigating the latest services and infrastructure available to cybercriminals for orchestrating SMS phishing campaigns. After analysing cybercrime forums, it is clear that SMS gateways are currently a highly ...
SMS Phishing Threats

SMS Gateways Allow Cybercriminals to Flood Phones With SMS Phishing Messages For Just €0.004 ($0.0044) Each

| | Mobile, Phishing
Our team has been investigating the latest services and infrastructure available to cybercriminals for orchestrating SMS phishing campaigns. After analysing cybercrime forums, it is clear that SMS gateways are currently a highly ...
Pandora hVNC Cybercrime tool

Silent, Yet Powerful Pandora hVNC, The Popular Cybercrime Tool That Flies Under the Radar

| | Malware, Threat Intelligence
Pandora hVNC is a remote access trojan (RAT) that has been advertised on cybercrime forums since 2021. Surprisingly, it has received little attention from the cybersecurity community. Despite this, it remains a ...
QR Code Phishing

Malicious Use of QR Codes on the Rise Through Quishing Attacks

| | Email Protection
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The QR code’s ...
Abrax666 Malicious Chatbot

Scam or Mega Chatbot? Investigating the New AI Chatbot Called Abrax666

An in-depth investigation of a new AI chatbot called Abrax666 advertised on cybercrime forums reveals multiple red flags suggesting it’s likely a scam. With a negative review after communication, no seller deposit, ...
Exploring The Malicious Usage of QR Codes

Exploring The Malicious Usage of QR Codes

| | Uncategorized
  Discover the history, types, and threats of QR codes, including quishing and QRLJacking. Learn why QR phishing is effective and how it exploits user trust, convenience, and bypasses security filters. Understanding ...