SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of Business Email Compromise (BEC) like 2021, but also reveals the growth of investment scams, which exceeded BEC losses in 2022. The key findings […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

World’s First On-Device AI Mobile Phishing Defense for SMS is Leading Industry Requirement for Ne...
SlashNext, the phishing authority, today announced the world’s first on-device AI mobile phishing…

Four Days to the Election— Don’t Fall for These Phishing Scams
With the Presidential election just a few days away, bad actors are ramping up their efforts to l…

Hundreds of Live Phishing Sites Menacing Amazon Prime Day Shoppers
This week, Amazon Prime Day prompted a big increase in phishing attacks, as reported by Threatpos…

DoH and Phishing Risks. What You Need to Know Now
As we continue to transition our lives to the digital world, our digital footprint continues to g…

Phishing 2.0 is Here — Make Sure You’re Prepared
Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threa…

SMishing Attacks Masquerading as USPS and FedEx
The USPS SMishing attack is a fast-moving, constantly changing credential stealing, social engine…

BYOD Trends and Endpoint Security — What’s best for your organization?
The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of rem…

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On
Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious…

Google Cloud Under Siege
It’s no secret that popular cloud and web services are a prime target for hackers to host p…

Phishing Attack Payloads Leaving Employees Vulnerable as Remote Work Trends Continue to Evolve
In recent years phishing has become the number one threat action over malware. Furthermore, recen…

Browser Extensions, an Overlooked Phishing Attack Vector
As users continue to leverage browser extensions to save time and increase productivity it is att…

Twitter Hack—Old Dog, New Tricks
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Thre…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.