Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...
Y2K Anniversary: Lessons for Future Tech and AI Safety

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety

Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises ...
Digital License Plate Vulnerabilities and How to Avoid New Text Message Scams

Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams

In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they ...
Sevco, Apple, DMA, EU, A green worm on a juicy red apple

iPhone Mirroring Flaw Could Expose Employee Personal Information

A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security ...
Security Boulevard
mobile ID, digital, verification, OTP

How Mobile ID Verification is Shaping the Future of Digital Payments

Integrating mobile ID verification into digital payment systems marks a significant milestone in the evolution of digital commerce ...
Security Boulevard
Evolution of Phishing Attacks

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization

The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
Evolution of Phishing Attacks

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization

The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
STORM-0539 Smishing compromises employees accounts

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems

We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...
FCC fines wireless carriers $200 million for sharing user location data!

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps

In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...