SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams
In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of cyberattacks but rather how attackers ingeniously reinvent old tactics. A prime example of this is obfuscation—a method deeply rooted in the annals of […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription
SlashNext Expands Collaboration with Microsoft Intelligent Security Association (MISA) Membership
We are excited to expa…
Attackers May Be Stealing Your Food and Ingredients Through BEC Phishing
Threat actors are curr…
State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed bil…
SlashNext Extends Award-Winning Enterprise Mobile for Home and Personal Use
With 83% of organizati…
Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites
The start of Amazon Pr…
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (Mit…
Phishing + Ransomware—Why Multi-Channel Protection is Essential to Stop Both
When it comes to spear…
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.