SlashNext Blog

Phishing, social engineering, and modern threats.

Featured Article

Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach

In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6-10 sanctioned apps on any given day. And that’s not even counting the unsanctioned tools that fly under IT’s radar. This proliferation of channels […]

Featured Article

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.

Blog Subscription

Credential Phishing

Understanding Credential Phishing

Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential phish…

Business Email Compromise

Understanding Business Email Compromise (BEC)

What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC …

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for detecting and filtering spam and gray…

It’s Time to Get Started with SlashNext

Learn how to leverage the industry’s best zero-hour phishing protection in your environment.

6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566


Privacy Policy

© All Rights Reserved, SlashNext, Inc.