SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Five Ways Spear Phishing Tactics are Evolving in 2025
What type of phishing became very effective around 2010 and still worries security teams today? Spear phishing. Spear phishing remains highly effective and is getting more dangerous by the day. What is spear phishing? What new technologies and methods will attackers use to get around common defenses? How will they become more precise and convincing? […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security
The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these …
G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Cat...
SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers each year. This recognition is decided b…
Five Types of Business Email Compromise Attacks and How to Prevent Them
In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) latest 2022 report, which emphasized a steep and significant rise in Business Email Compromise (BEC) growth. The…
Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of Business Email Compro…
The Downside to March Madness – a Busted Bracket and a Data Breach
Back in the 1930s, March Madness was used to describe the excitement and frenzy surrounding an Illinois high school basketball tournament. Over the years, the term has become associated with the frenetic NCAA (National Collegia…
The SEG Conundrum. What’s Right for My Organization?
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious emails from arriving in users’ mailboxes. The early SEGs were designed to scan incoming and outgoing email messag…
Chatbot Wars and the Battle Between Good and Evil
Chatbot wars are gearing up for full throttle – with Microsoft, Google, and potentially Apple leading the race. Microsoft-backed OpenAI has the first-mover lead in the arms race with the fastest growing tool ever. But Goo…
The Truth About Why Malicious Links Get Through Security
KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon Web Services), Wix, GoDaddy and many others, and these services are thought safe by many security services. The malicious links a…
SlashNext Expands Collaboration with Microsoft Intelligent Security Association (MISA) Membership
We are excited to expand our collaboration with Microsoft Intelligent Security Association (MISA) by integrating our artificial intelligence (AI) technology and real-time threat detection with Microsoft Sentinel. This collabora…
Attackers May Be Stealing Your Food and Ingredients Through BEC Phishing
Threat actors are currently using BEC (Business Email Compromise) attacks to steal large food shipments and ingredients from suppliers and distributors around the country according to a recent FBI advisory. And the attacks appe…
State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of ph…
SlashNext Extends Award-Winning Enterprise Mobile for Home and Personal Use
With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon MIS report. Hackers are turning attention to mobile devices using tactics including SMS/text p…
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.