SlashNext Media Coverage
Follow the latest interviews and phishing threat findings on SlashNext Threat Labs and AI Phishing Defense media coverage.
The 13 Best Browser Security Platforms to Consider in 2023 – Solutions Review
SlashNext Browser Protection comes in the form of cloud-powered browser extensions available for …
Intro to phishing: simulating attacks to build resiliency – Security Affairs
Phishing attacks are a major threat to organizations, they remain a perennial choice of cybercrim…
4 phishing emails in your inbox that are just waiting to steal your money – MSN
A study from SlashNext even showed that in 2022, there were 255 million phishing scam attacks, a …
Intro to phishing: simulating attacks to build resiliency – CyberNews
A 2022 analysis of several billion document attachments, website links, and email messages, by cy…
4 phishing emails in your inbox that are just waiting to steal your money – Business Insider
A study from SlashNext even showed that in 2022, there were 255 million phishing scam attacks, a …
121 healthcare cybersecurity companies to know | 2023 – Hospital Review
Healthcare is one of the most heavily targeted industries when it comes to phishing attacks, and …
Anti-spam Software Market to Reach $ 22.03 Billion by 2030: Cognitive Market Research – Yah...
According to the report published by SlashNext, in 2022, phishing attacks have increased by 61% c…
2023 Update – How Are the Most-Spoofed Brands Represented in the DNS? – CircleID
SlashNext detected 255 million phishing attacks over six months in 2022. They detailed their find…
Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks – Dark Reading
“Spear-phishing attacks are successful when the communications are well written, use person…
Cryptocurrency Phishing Threats Luring New Victims – Security Boulevard
Patrick Harr, CEO at SlashNext, points out there is a lot of volatility in the cryptocurrency mar…
Attackers Use QuickBooks to Launch ‘BEC 3.0’ Campaign – Security Boulevard
Users have little reason to doubt the veracity of the emails. “Hackers use SharePoint, OneDrive, …
Five Types of Business Email Compromise Attacks and How to Prevent Them – Security Boulevard
SlashNext fights AI cyberthreats with AI cybersecurity technology to beat these malicious threat …
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.