Phishing, the 3000 lb. Gorilla
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020.
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020.
Fast-moving threats are taking days to appear on VirusTotal and other leading threat feeds leaving the bad actors an eternity to wreak havoc on remote workers.
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by…
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in…
Given the current demand for remote working, phishing attacks on mobile devices are particularly worrisome for security professionals. There is only a 30% penetration of threat defense on mobile devices,…
Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers. Nearly half of all survey respondents (47%) reported spending up…
As security threats become progressively sophisticated, IT organizations are looking to managed security services to provide trusted security solutions to fill the gaps. While the demand is high for MSSPs,…
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by…
SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our anti-phishing solutions. One of its best features is preemptive threat…
Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever public emotions are running high, cybercriminals try to take advantage…