SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an employee receiving a text that appears to be from their bank: “Suspicious activity detected on your account. Click here to secure your account.” […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
![SlashNext Expands Collaboration with Microsoft Intelligent Security Association (MISA) Membership](https://slashnext.com/wp-content/uploads/2023/02/SNXMSFT-Linkedin-768x402.png)
SlashNext Expands Collaboration with Microsoft Intelligent Security Association (MISA) Membership
We are excited to expand our collaboration with Microsoft Intelligent Security Association (MISA) by integrating our artificial intelligence (AI) technology and real-time threat detection with Microsoft Sentinel. This collabora…
![Attackers May Be Stealing Your Food and Ingredients Through BEC Phishing](https://slashnext.com/wp-content/uploads/2023/01/food-jakub-kapusnak-vnNFWKY7Tj4-unsplash-768x512.jpg)
Attackers May Be Stealing Your Food and Ingredients Through BEC Phishing
Threat actors are currently using BEC (Business Email Compromise) attacks to steal large food shipments and ingredients from suppliers and distributors around the country according to a recent FBI advisory. And the attacks appe…
![](https://slashnext.com/wp-content/uploads/2022/10/Linkedin-1200x628-1-768x402.png)
State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of ph…
![](https://slashnext.com/wp-content/uploads/2020/01/Mobile-worker.jpg)
SlashNext Extends Award-Winning Enterprise Mobile for Home and Personal Use
With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon MIS report. Hackers are turning attention to mobile devices using tactics including SMS/text p…
![Spear phishing remote working](https://slashnext.com/wp-content/uploads/2021/10/Remote-working-2.png)
Expert Guide to Microsoft 365 Email Threat Protection
With the demands of the modern workforce, there’s been an increased use of native cloud email protection, like Microsoft 365, in the last 12 months. This has led many security professionals to ask if Microsoft 365 Defende…
![Amazon Prime Day Shopper](https://slashnext.com/wp-content/uploads/2022/07/Amazon-prime-day-shoppers-768x512.png)
Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites
The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These attacks target shoppers anxiously awaiting the amazing offers and discounts revealed during the two-day sale, and bad actors are read…
![C2 Callbacks](https://slashnext.com/wp-content/uploads/2019/12/C2-Hacks.jpg)
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their application. In these attacks, a hacker will hijack the application to steal credentials or open a backdoor to their network. These at…
![Ransomware Attack](https://slashnext.com/wp-content/uploads/2021/05/ransomware-attack.jpg)
Phishing + Ransomware—Why Multi-Channel Protection is Essential to Stop Both
When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: Ransomware has continued its upward trend with an almost 13%increase–a rise as big as the last fi…
![10 Reasons Why Email Protection is Critical in 2022](https://slashnext.com/wp-content/uploads/2022/05/sln-email-protection.png)
10 Reasons Why Email Protection is Critical in 2022
We all use email all day long. No matter what industry you’re in or where you are working around the globe, you’re more than likely using email to communicate, work and socialize. Most of us check our email multiple times a day…
![browser and web security](https://slashnext.com/wp-content/uploads/2020/08/malicious-browser-extension.jpg)
Getting Intelligent About Browser Security
Fixing browser security with artificial intelligence Had you told me 30 years ago the first web browser would be the ancestor of most software interfaces, I’d have been skeptical. Of course, that was before most of us had…
![](https://slashnext.com/wp-content/uploads/2022/04/Tax-Scams.png)
Beware! It’s Not the IRS Texting, Emailing, or Calling You
There are many compelling reasons why tax returns are valuable to hackers, but all are related to monetary gain. Tax returns are dense with personal information, including social security numbers, dependents’ PII, propert…
![](https://slashnext.com/wp-content/uploads/2022/04/Malicious_Webpage_Screenshot-47-768x389.png)
Phishing Threats Hiding Behind Trusted Microsoft Domains
Throughout 2021 there was a growing increase in cyber threats hosted on legitimate services like Microsoft Teams, OneDrive, SharePoint, and OneNote to deliver phishing campaigns. These domains’ trusted reputation enables …
![](https://slashnext.com/wp-content/uploads/2020/07/slashnextloading.gif)
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.