What Does Your Current Security Infrastructure Look Like?
Commissioned research shows that more security influencers and decision makers want security infrastructure that goes beyond what they currently have in place.
Commissioned research shows that more security influencers and decision makers want security infrastructure that goes beyond what they currently have in place.
While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer?
The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it.
The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication.
Here are the remaining 5 new approaches for helping organizations improve their phishing security. The threat landscape is changing… are you?
Here are the first 5 of 10 new approaches for helping organizations improve their phishing security. Come back for the remaining 5 in a future blog post.
SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website.
Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated.
Today SOC teams seem to be in a state of flux; where balancing the need for fast, threat remediation is challenged by the volume of threats. Here are some thoughts.
SlashNext recently discovered a new malicious phishing threat that abuses Adobe’s open redirect services. Read our blog for details and how you can stop it.