SlashNext Blog

Phishing, social engineering, and modern threats.

Featured Article

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we will explore a real-life example of this: the abuse of DocuSign’s actual application to deliver malicious links. Then, we’ll dive into how our […]

Featured Article

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.

Blog Subscription

Business Email Compromise

Understanding Business Email Compromise (BEC)

What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC …

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for detecting and filtering spam and gray…

Exploring The Malicious Usage of QR Codes

Discover the history, types, and threats of QR codes, including quishing and QRLJacking. Learn why QR phishing is effective and how it exploits user trust, convenience, and bypasses security filters. Understanding QR Codes: A B…

It’s Time to Get Started with SlashNext

Learn how to leverage the industry’s best zero-hour phishing protection in your environment.

6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com

 

Privacy Policy

© All Rights Reserved, SlashNext, Inc.