Malicious Use of QR Codes on the Rise Through Quishing Attacks
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The…
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The…
In this blog post, we delve into the emerging use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Highlighting real cases…
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to…
SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers…
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious emails from arriving in users’ mailboxes. The early SEGs were…
With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon MIS report. Hackers are turning attention to mobile devices using…
With the demands of the modern workforce, there's been an increased use of native cloud email protection, like Microsoft 365, in the last 12 months. This has led many security…