SlashNext Blog

Phishing, social engineering, and modern threats.

Featured Article

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an employee receiving a text that appears to be from their bank: “Suspicious activity detected on your account. Click here to secure your account.” […]

Featured Article

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.

Blog Subscription

Credential Phishing

Understanding Credential Phishing

Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential phish…

Business Email Compromise

Understanding Business Email Compromise (BEC)

What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC …

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for detecting and filtering spam and gray…

It’s Time to Get Started with SlashNext

Learn how to leverage the industry’s best zero-hour phishing protection in your environment.

6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com

 

Privacy Policy

© All Rights Reserved, SlashNext, Inc.