SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their application. In these attacks, a hacker will hijack the application to steal credentials or open a backdoor to their network. These attacks are very dangerous because often, the victim does not know they have been compromised, and detecting them […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

AI and ML Leads the Trend in Technologies that will Fill the Cybersecurity Skills Gaps
As the shortage of skilled cybersecurity professionals intersects with the change and sophisticat…

World’s First On-Device AI Mobile Phishing Defense for SMS is Leading Industry Requirement for Ne...
SlashNext, the phishing authority, today announced the world’s first on-device AI mobile phishing…

Four Days to the Election— Don’t Fall for These Phishing Scams
With the Presidential election just a few days away, bad actors are ramping up their efforts to l…

Hundreds of Live Phishing Sites Menacing Amazon Prime Day Shoppers
This week, Amazon Prime Day prompted a big increase in phishing attacks, as reported by Threatpos…

DoH and Phishing Risks. What You Need to Know Now
As we continue to transition our lives to the digital world, our digital footprint continues to g…

Phishing 2.0 is Here — Make Sure You’re Prepared
Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threa…

SMishing Attacks Masquerading as USPS and FedEx
The USPS SMishing attack is a fast-moving, constantly changing credential stealing, social engine…

BYOD Trends and Endpoint Security — What’s best for your organization?
The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of rem…

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On
Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious…

Google Cloud Under Siege
It’s no secret that popular cloud and web services are a prime target for hackers to host p…

Phishing Attack Payloads Leaving Employees Vulnerable as Remote Work Trends Continue to Evolve
In recent years phishing has become the number one threat action over malware. Furthermore, recen…

Browser Extensions, an Overlooked Phishing Attack Vector
As users continue to leverage browser extensions to save time and increase productivity it is att…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.