SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report
Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in losses The 2023 FBI IC3 report reveals not just numbers but narratives that underscore the adaptability and cunning of today’s cyber adversaries. With a record-setting $12.5 billion in losses, a 22% increase from the previous year, the report is a wake-up […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
Human Hacking and Multi-Channel Phishing is Surging
Human hacking is a modern way to think about phishing in its entirety, which is anything maliciou…
Social Engineering Threats Rose 270% in 2021 – Indicating a Shift to Multi-Channel Phishing Attac...
With the rise of 270% rise in social engineering in 2021, humans are the most vulnerable cybersec…
Spear Phishing from Trusted Sites Bypassing SEGs 65% of the Time
The rise of well-crafted spear phishing is the leading factor in the success of phishing attacks …
Why Your Security Strategy Needs to Think More About the Browser to stop Ransomware
Cybercriminals are Open for Business and Ransomware is the Daily Special When it comes to spear-p…
Overcoming the Corporate Security and Employee Privacy Challenge
The shift to remote working has blurred the lines between people’s business and personal lives. W…
SlashNext Reinvents Incident Response with Cortex XSOAR
The current security landscape is filled with targeted attacks, including sophisticated phishing …
A Swarm of Ransomware Attacks Highlights the Need for High-Quality Threat Detection at the Start ...
Ransomware is insidious. It’s a treacherous and crafty way to terrorize individuals, commun…
BYOD Trends for Remote Workers -Finding the balance between security and privacy
The BYOD (Bring-Your-Own-Device) age has been around now for some time. The megatrends of remote …
Did One Phish Take Down a Pipeline?
What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with t…
Social Media Apps like LinkedIn Have Become Tools for Human Hacking
Hackers no longer rely solely on email when trying to infiltrate your organization. Social media,…
Multi-Factor Authentication is Not Foolproof Protection
Multi-Factor Authentication (MFA) has become increasingly common both in business and personal us…
Prepare Your Organization for MFA Compromise
Learn how Hackers are Bypassing MFA with Astonishing Accuracy Understanding and preparing for ho…
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.