SlashNext Blog

Phishing, social engineering, and modern threats.

Featured Article

Social Media Apps like LinkedIn Have Become Tools for Human Hacking

Hackers no longer rely solely on email when trying to infiltrate your organization. Social media, including LinkedIn, have become the new preferred method of attack for these criminals. This year, Google’s Threat Analysis Group (TAG) discovered a largescale cyberattack that originated out of North Korea. The cyberattack utilized fake blogs, fake email accounts, and even […]

Featured Article

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

On-demand phishing URL analysis solutions can help ease your SOC teams’ pain and challenges.

Blog Subscription

It’s Time to Get Started with SlashNext

Learn how to leverage the industry’s best zero-hour phishing protection in your environment.

Close Menu
Free Phishing Risk Assessment

30% of Your Employees Clicked on a Phishing Attack This Month

FACT: 30% of phishing is still getting through current defenses. How is your organization doing?