SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims
Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning tools to disperse misinformation for cybercriminal scams. It doesn’t take much for an audio recording of a voice – only about 10 to […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

Zero-Hour Phishing Attack on Google’s App Engine Targeting Office 365 Users Pushes Holiday Spike ...
As we write this post, SlashNext Threat Labs is witnessing an active attack on Google’s App Engin…

Phishing with Zoom
Since the shift to remote work, attackers are capitalizing on the surge in new tools to aid remot…

Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
When it comes to detecting phishing and social engineering threats, slow response times are detri…

AI and ML Leads the Trend in Technologies that will Fill the Cybersecurity Skills Gaps
As the shortage of skilled cybersecurity professionals intersects with the change and sophisticat…

World’s First On-Device AI Mobile Phishing Defense for SMS is Leading Industry Requirement for Ne...
SlashNext, the phishing authority, today announced the world’s first on-device AI mobile phishing…

Four Days to the Election— Don’t Fall for These Phishing Scams
With the Presidential election just a few days away, bad actors are ramping up their efforts to l…

Hundreds of Live Phishing Sites Menacing Amazon Prime Day Shoppers
This week, Amazon Prime Day prompted a big increase in phishing attacks, as reported by Threatpos…

DoH and Phishing Risks. What You Need to Know Now
As we continue to transition our lives to the digital world, our digital footprint continues to g…

Phishing 2.0 is Here — Make Sure You’re Prepared
Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threa…

SMishing Attacks Masquerading as USPS and FedEx
The USPS SMishing attack is a fast-moving, constantly changing credential stealing, social engine…

BYOD Trends and Endpoint Security — What’s best for your organization?
The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of rem…

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On
Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.