SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Exploring the World of AI Jailbreaks
Explore AI jailbreaking and discover how users are pushing ethical boundaries to fully exploit the capabilities of AI chatbots. This blog post examines the strategies employed to jailbreak AI systems and the role of AI in cybercrime. The Emergence of AI Jailbreaks In recent years, AI chatbots like ChatGPT have made significant advancements in their […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

Exploring the World of AI Jailbreaks
Explore AI jailbreaking and discover how users are pushing ethical boundaries to fully exploit th…

How Cybercriminals Abuse Airbnb For Fraudulent Activities
Cyberattacks are becoming increasingly common and sophisticated. One particular concern is the ri…

AI-Based Cybercrime Tools WormGPT and FraudGPT Could Be The Tip of the Iceberg
The rise of AI-powered cybercrime tools like WormGPT and FraudGPT has significant implications fo…

WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromi...
In this blog post, we delve into the emerging use of generative AI, including OpenAI’s Chat…

Today’s cybersecurity health checks must identify AI based threats. Does yours?
Your organization will most likely face AI based threats in cybersecurity at some point this year…

CISOs Increasingly Concerned About Mobile Threats
A new warning from Verizon about the rise of smishing, spam text messages and text scams and the …

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims
Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to…

Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security
The rising trend of employees using personal devices for work has cybercriminals directing focus …

G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Cat...
SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the…

Five Types of Business Email Compromise Attacks and How to Prevent Them
In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Compl…

Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just …

The Downside to March Madness – a Busted Bracket and a Data Breach
Back in the 1930s, March Madness was used to describe the excitement and frenzy surrounding an Il…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.