Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls
“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have
“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave
In this blog post, we delve into the emerging use of generative AI, including OpenAI’s ChatGPT, and the cybercrime tool
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you
SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious
With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon
With the demands of the modern workforce, there’s been an increased use of native cloud email protection, like Microsoft 365,