SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an employee receiving a text that appears to be from their bank: “Suspicious activity detected on your account. Click here to secure your account.” […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
![Impersonation Attack Dashboard](https://slashnext.com/wp-content/uploads/2024/08/Impersonation-Attack-Dashboard-768x373.png)
Revamping Email Security: Introducing SlashNext’s Enhanced Administration Portal CMS
In today’s fast-paced digital landscape, ensuring robust email security while maintaining operational efficiency is paramount. At SlashNext, we are dedicated to providing cutting-edge solutions to keep your organization secure …
![Frost Radar: Email Security 2024](https://slashnext.com/wp-content/uploads/2024/07/feature-frost-radar-black-768x609.png)
Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Lands...
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical import…
![CISA Issues Warning](https://slashnext.com/wp-content/uploads/2024/07/thisisengineering-1oYSrlQrpY4-unsplash-768x512.jpg)
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other c…
![New FishXProxy Phishing Kit](https://slashnext.com/wp-content/uploads/2024/07/hero-1-768x434.png)
New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground. With its array of…
![Evolution of Phishing Attacks](https://slashnext.com/wp-content/uploads/2024/06/evolution_of_phishing_700249973-768x336.jpeg)
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it has permeat…
![Gartner 2024 NA Security & Risk Management Summit](https://slashnext.com/wp-content/uploads/2024/06/gartner-booth-768x465.png)
AI Everywhere: Key Takeaways from the Gartner Security & Risk Management Summit 2024
The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations incre…
![Multi-Channel Threat Blindspot Leaves Your Organization Vulnerable to Breach](https://slashnext.com/wp-content/uploads/2024/06/messaging-breach_714204025-768x335.jpeg)
Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach
In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6…
![Tolly Group Test Report 2024](https://slashnext.com/wp-content/uploads/2024/06/tolly-group-test-report-cover.png)
The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess
In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors, with zero-hour Business Email Compromise (BEC) and advanced phishing attacks posing significant risks to organizations. A recent…
![Credential Phishing](https://slashnext.com/wp-content/uploads/2024/05/credential-phishing-605873831-768x511.jpeg)
Understanding Credential Phishing
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential phish…
![Business Email Compromise](https://slashnext.com/wp-content/uploads/2024/05/bec_267373614-768x512.jpeg)
Understanding Business Email Compromise (BEC)
What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC …
![STORM-0539 Smishing compromises employees accounts](https://slashnext.com/wp-content/uploads/2024/05/smishing-giftcard-scam-768x405.jpeg)
Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems
We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat actor…
![SlashNext Introduces Gen AI for Spam and Graymail](https://slashnext.com/wp-content/uploads/2024/05/spam-768x504.jpg)
SlashNext Introduces Gen AI for Spam and Graymail
SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for detecting and filtering spam and gray…
![](https://slashnext.com/wp-content/uploads/2020/07/slashnextloading.gif)
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.