SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation
Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, and encoding, this tool transforms malicious HTML content into a form that’s harder for security systems to recognize. Contact a SlashNext security expert […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites
The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These attacks target shoppers anxiously awaiting the amazing offers and discounts revealed during the two-day sale, and bad actors are read…
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their application. In these attacks, a hacker will hijack the application to steal credentials or open a backdoor to their network. These at…
Phishing + Ransomware—Why Multi-Channel Protection is Essential to Stop Both
When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: Ransomware has continued its upward trend with an almost 13%increase–a rise as big as the last fi…
10 Reasons Why Email Protection is Critical in 2022
We all use email all day long. No matter what industry you’re in or where you are working around the globe, you’re more than likely using email to communicate, work and socialize. Most of us check our email multiple times a day…
Getting Intelligent About Browser Security
Fixing browser security with artificial intelligence Had you told me 30 years ago the first web browser would be the ancestor of most software interfaces, I’d have been skeptical. Of course, that was before most of us had…
Beware! It’s Not the IRS Texting, Emailing, or Calling You
There are many compelling reasons why tax returns are valuable to hackers, but all are related to monetary gain. Tax returns are dense with personal information, including social security numbers, dependents’ PII, propert…
Phishing Threats Hiding Behind Trusted Microsoft Domains
Throughout 2021 there was a growing increase in cyber threats hosted on legitimate services like Microsoft Teams, OneDrive, SharePoint, and OneNote to deliver phishing campaigns. These domains’ trusted reputation enables …
Top 3 Reasons Multi-Channel Phishing is a Real and Present Danger Now
Multi-channel phishing is fast becoming the preferred way for cybercriminals to deliver successful attacks because they know there are gaps in cyber defenses. While organizations focus on protecting email from phishing and malw…
The Future of Browser Security Lies in AI and Machine Learning
With software becoming more secure and adept at defending against malware, the cyberattack threat environment has shifted towards phishing. But unlike in the past, where these attacks were predominantly email-driven, hackers ar…
Human Hacking and Multi-Channel Phishing is Surging
Human hacking is a modern way to think about phishing in its entirety, which is anything malicious that reaches a user to steal credentials, data, or financial information. By focusing on phishing as an email problem or a spam …
Social Engineering Threats Rose 270% in 2021 – Indicating a Shift to Multi-Channel Phishing Attac...
With the rise of 270% rise in social engineering in 2021, humans are the most vulnerable cybersecurity entry points into an organization. By moving completely to the cloud, apps and browsers are all humans need to communicate w…
Spear Phishing from Trusted Sites Bypassing SEGs 65% of the Time
The rise of well-crafted spear phishing is the leading factor in the success of phishing attacks in 2021. In an environment where cybercriminals use automation and AI to increase the likelihood of compromising a target, the onc…
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.