Security Training Will Not Save You From Phishing Attacks

Think Security Training Will Save You From Phishing Attacks? Think Again!

What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics ...
Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have uncovered a dangerous new type of cyberattack in the wild that uses ...
QR Code Phishing

Malicious Use of QR Codes on the Rise Through Quishing Attacks

| | Email Protection
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The QR code’s ...

LinkedIn Smartlinks Attacks Target Microsoft Accounts

In the ever-evolving landscape of cybersecurity threats, hackers have once again employed a cunning strategy by exploiting LinkedIn’s Smart Links in phishing attacks, aiming to steal Microsoft account credentials. These sophisticated LinkedIn ...
WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

In this blog post, we delve into the emerging use of generative AI, including OpenAI’s ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Highlighting real cases from cybercrime ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers each year ...
The SEG Conundrum. What's Right for My Organization?

The SEG Conundrum. What’s Right for My Organization?

| | bec, Email Protection
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious emails from arriving in users’ mailboxes. The early SEGs were designed to ...

SlashNext Extends Award-Winning Enterprise Mobile for Home and Personal Use

With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon MIS report. Hackers are turning attention to mobile devices using tactics including ...
™

Expert Guide to Microsoft 365 Email Threat Protection

With the demands of the modern workforce, there’s been an increased use of native cloud email protection, like Microsoft 365, in the last 12 months. This has led many security professionals to ...