Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between ...

C-Level Security Compliance – The Need for Communication and Automation

While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer? ...

Healthcare Organizations Continue to be a Soft Target for Phishing Attacks

The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it ...

FBI Alerts that 2FA is Bypassed by Phishing Attacks

The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication ...

10 New Approaches to Help Organizations Improve Phishing Security – Part One

Here are the first 5 of 10 new approaches for helping organizations improve their phishing security. Come back for the remaining 5 in a future blog post ...
Malvertising on Legitimate Websites, Even The New York Times

Malvertising on Legitimate Websites, Even The New York Times

SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website ...

Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated ...