SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report
Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in losses The 2023 FBI IC3 report reveals not just numbers but narratives that underscore the adaptability and cunning of today’s cyber adversaries. With a record-setting $12.5 billion in losses, a 22% increase from the previous year, the report is a wake-up […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report
Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in losses …
Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls
“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishin…
SMS Gateways Allow Cybercriminals to Flood Phones With SMS Phishing Messages For Just €0.004 ($0....
Our team has been investigating the latest services and infrastructure available to cybercriminal…
Silent, Yet Powerful Pandora hVNC, The Popular Cybercrime Tool That Flies Under the Radar
Pandora hVNC is a remote access trojan (RAT) that has been advertised on cybercrime forums since …
Malicious Use of QR Codes on the Rise Through Quishing Attacks
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso …
Scam or Mega Chatbot? Investigating the New AI Chatbot Called Abrax666
An in-depth investigation of a new AI chatbot called Abrax666 advertised on cybercrime forums rev…
Exploring The Malicious Usage of QR Codes
Discover the history, types, and threats of QR codes, including quishing and QRLJacking. Learn wh…
Exploring the World of AI Jailbreaks
Explore AI jailbreaking and discover how users are pushing ethical boundaries to fully exploit th…
How Cybercriminals Abuse Airbnb For Fraudulent Activities
Cyberattacks are becoming increasingly common and sophisticated. One particular concern is the ri…
AI-Based Cybercrime Tools WormGPT and FraudGPT Could Be The Tip of the Iceberg
The rise of AI-powered cybercrime tools like WormGPT and FraudGPT has significant implications fo…
WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromi...
In this blog post, we delve into the emerging use of generative AI, including OpenAI’s Chat…
Today’s cybersecurity health checks must identify AI based threats. Does yours?
Your organization will most likely face AI based threats in cybersecurity at some point this year…
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.