Google Cloud Under Siege
It’s no secret that popular cloud and web services are a prime target for hackers to host phishing sites. The
It’s no secret that popular cloud and web services are a prime target for hackers to host phishing sites. The
In recent years phishing has become the number one threat action over malware. Furthermore, recent workforce changes spurred by the
As users continue to leverage browser extensions to save time and increase productivity it is attracting the attention of cybercriminals. Learn how malicious extensions are making their way into the official stores and how to stay safe.
With the rising popularity of iOS and Android devices for everything from sending a client an SMS to attending a
Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020.
Fast-moving threats are taking days to appear on VirusTotal and other leading threat feeds leaving the bad actors an eternity to wreak havoc on remote workers.
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside
Given the current demand for remote working, phishing attacks on mobile devices are particularly worrisome for security professionals. There is