SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Exploring the World of AI Jailbreaks
Explore AI jailbreaking and discover how users are pushing ethical boundaries to fully exploit the capabilities of AI chatbots. This blog post examines the strategies employed to jailbreak AI systems and the role of AI in cybercrime. The Emergence of AI Jailbreaks In recent years, AI chatbots like ChatGPT have made significant advancements in their […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
BYOD Trends for Remote Workers -Finding the balance between security and privacy
The BYOD (Bring-Your-Own-Device) age has been around now for some time. The megatrends of remote …
Did One Phish Take Down a Pipeline?
What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with t…
Social Media Apps like LinkedIn Have Become Tools for Human Hacking
Hackers no longer rely solely on email when trying to infiltrate your organization. Social media,…
Multi-Factor Authentication is Not Foolproof Protection
Multi-Factor Authentication (MFA) has become increasingly common both in business and personal us…
Prepare Your Organization for MFA Compromise
Learn how Hackers are Bypassing MFA with Astonishing Accuracy Understanding and preparing for ho…
Thousands of Zero-Day Spear Phishing Attacks Continue to Target Covid-19 Pharmaceuticals
Three days before the end of 2020 SlashNext Threat Labs observed a flurry of spear-phishing attac…
You Want to Know How to Stop Phishing for Good. Hint: It’s Not a Silver Bullet
In a recent survey, security professionals in mid to large-sized organizations were asked how to …
Constant Vigilance Required to Defeat Continually Evolving Phishing Threats
It’s been a year since states first enacted shelter in place orders, most employees began working…
Phishing Attacks that Defeat 2FA Every Time
Protected with 2FA? Think Again. Two-factor authentication (2FA) is certainly a best practice for…
URL Scanning vs. URL Analysis and Enrichment: What’s the Difference and Why it Matters.
Researching URLs in suspected phishing incidents is a costly and time-intensive process, accordin…
Social Engineering Attacks Hacking Humans Today
Earlier this year, SlashNext debuted “Phish Stories,” a videocast and podcast series during which…
Next-Gen Protection Essential to Prevent Evolving Phishing Attacks
In early February, SlashNext debuted “Phish Stories,” a videocast and podcast series designed to …
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.