Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

"Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have uncovered a dangerous new type of cyberattack in the wild…

Continue ReadingThreat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

In this blog post, we delve into the emerging use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Highlighting real cases…

Continue ReadingWormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to…

Continue ReadingToday’s cybersecurity health checks must identify AI based threats. Does yours?

G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers…

Continue ReadingG2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories