Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security
SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our
SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our
Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever
With the COVID-19 pandemic spreading throughout the United States, it’s likely that most US workers will find themselves working from
A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not
Protecting mobile users from today’s phishing threats is a huge and growing challenge for IT security teams. Employees increasingly rely
Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set
If you’re in the IT security space, you no doubt realize that phishing remains a constant threat. Exploiting the human
With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT
Lightweight, cloud-powered endpoint solutions protect remote users from the new multi-vector phishing threat landscape At SlashNext, protecting organizations from advanced
As we near the end of the year, it’s always nice to look back and reflect on trends we saw.