SlashNext Blog
Phishing, social engineering, and modern threats.
Featured Article
Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of Business Email Compromise (BEC) like 2021, but also reveals the growth of investment scams, which exceeded BEC losses in 2022. The key findings […]
Featured Article
10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.
Blog Subscription

Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just …

The Downside to March Madness – a Busted Bracket and a Data Breach
Back in the 1930s, March Madness was used to describe the excitement and frenzy surrounding an Il…

The SEG Conundrum. What’s Right for My Organization?
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used t…

Chatbot Wars and the Battle Between Good and Evil
Chatbot wars are gearing up for full throttle – with Microsoft, Google, and potentially App…

The Truth About Why Malicious Links Get Through Security
KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon…

SlashNext Expands Collaboration with Microsoft Intelligent Security Association (MISA) Membership
We are excited to expand our collaboration with Microsoft Intelligent Security Association (MISA)…

Attackers May Be Stealing Your Food and Ingredients Through BEC Phishing
Threat actors are currently using BEC (Business Email Compromise) attacks to steal large food shi…

State of Phishing Report Reveals More Than 255 Million Attacks in 2022
SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in ema…

SlashNext Extends Award-Winning Enterprise Mobile for Home and Personal Use
With 83% of organizations reporting mobile device threats are growing more quickly than other dev…

Expert Guide to Microsoft 365 Email Threat Protection
With the demands of the modern workforce, there’s been an increased use of native cloud ema…

Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites
The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These att…

Man in the Middle Attacks: What are they anyway, and how to prevent them.
Man in the Middle (MitM) attacks occur when a cybercriminal comes between the user and their appl…

It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.
6701 Koll Center Parkway, Suite 250
Pleasanton CA 94566
800.930.8643
info@slashnext.com
© All Rights Reserved, SlashNext, Inc.