SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their application. In these attacks, a hacker will hijack the application to steal credentials or open a backdoor to their network. These attacks are very dangerous because often, the victim does not know they have been compromised, and detecting them […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

Twitter Hack—Old Dog, New Tricks
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Thre…

Mobile Phishing, the Next Battleground
With the rising popularity of iOS and Android devices for everything from sending a client an SMS…

Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable
Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an em…

Phishing, the 3000 lb. Gorilla
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishin…

It Takes 48 Hours to Catch a Phishing Threat?
Fast-moving threats are taking days to appear on VirusTotal and other leading threat feeds leavin…

Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable to…

Going Beyond Awareness Training to Protect Mobile Devices from Phishing
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile …

5 Ways Phishing Attacks Manipulate Mobile Devices Outside Email
Given the current demand for remote working, phishing attacks on mobile devices are particularly …

5 Ways URL Analysis and Enrichment Benefits Managed Service Providers
Researching URLs in suspected phishing incidents is a costly and time-intensive process, accordin…

Expand Your MSSP Portfolio with 360 Protection Across Mobile, Email, and Web
As security threats become progressively sophisticated, IT organizations are looking to managed s…

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable to…

Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security
SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and pate…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.