
Phishing Attacks that Defeat 2FA Every Time
Protected with 2FA? Think Again. Two-factor authentication (2FA) is certainly a best practice for corporate security, but cybercriminals are also
Protected with 2FA? Think Again. Two-factor authentication (2FA) is certainly a best practice for corporate security, but cybercriminals are also
In early February, SlashNext debuted “Phish Stories,” a videocast and podcast series designed to educate cybersecurity professionals about the latest, most innovative phishing attacks challenging businesses today. In each
In 2020 phishing exploded as the world faced a 100-year pandemic and many people moved to remote working and learning,
Cybercriminals are using automation and AI to increase the likelihood of compromising a target. What was once spray and pray
There has been a 600 percent increase in mobile SMS phishing attacks (also known as SMiShing) in 2020, and there
Today, SlashNext Threat Labs observed a flurry of spear-phishing attacks targeting companies at the forefront of Covid-19 vaccines and therapeutics
The number one cause of a cybersecurity breach is phishing, and this year the average cost of a corporate breach
Since the shift to remote work, attackers are capitalizing on the surge in new tools to aid remote workers as
When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take down more malicious brand content in less time.
As the shortage of skilled cybersecurity professionals intersects with the change and sophistication of the threat landscape, AI and ML