SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their application. In these attacks, a hacker will hijack the application to steal credentials or open a backdoor to their network. These attacks are very dangerous because often, the victim does not know they have been compromised, and detecting them […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

URL Scanning vs. URL Analysis and Enrichment: What’s the Difference and Why it Matters.
Researching URLs in suspected phishing incidents is a costly and time-intensive process, accordin…

Social Engineering Attacks Hacking Humans Today
Earlier this year, SlashNext debuted “Phish Stories,” a videocast and podcast series during which…

Next-Gen Protection Essential to Prevent Evolving Phishing Attacks
In early February, SlashNext debuted “Phish Stories,” a videocast and podcast series designed to …

SlashNext Named in The Top 25 Cybersecurity Companies Of 2020
The companies selected for this year’s awards represent some of the most innovative and technical…

The State of Phishing in 2021
In 2020 phishing exploded as the world faced a 100-year pandemic and many people moved to remote …

As Phishing Attacks Increase in Success, SlashNext Spear Phishing Detection Rates Highest Among K...
Cybercriminals are using automation and AI to increase the likelihood of compromising a target. W…

SMiShing Spawns the Need for a Better AI Mobile Phishing Defense
There has been a 600 percent increase in mobile SMS phishing attacks (also known as SMiShing) in …

Zero-Day Spear Phishing Attack Targeting Covid-19 Pharmaceuticals—Likely Nation-State Threat Acto...
Today, SlashNext Threat Labs observed a flurry of spear-phishing attacks targeting companies at t…

Phishing Will Continue to Wreak Havoc in 2021—Make Sure You’re Ready
The number one cause of a cybersecurity breach is phishing, and this year the average cost of a c…

Zero-Hour Phishing Attack on Google’s App Engine Targeting Office 365 Users Pushes Holiday Spike ...
As we write this post, SlashNext Threat Labs is witnessing an active attack on Google’s App Engin…

Phishing with Zoom
Since the shift to remote work, attackers are capitalizing on the surge in new tools to aid remot…

Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
When it comes to detecting phishing and social engineering threats, slow response times are detri…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.