Did One Phish Take Down a Pipeline?
What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with the Colonial Pipeline attack, Ransomware is the number one cybersecurity threat to organizations, but it's also…
What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with the Colonial Pipeline attack, Ransomware is the number one cybersecurity threat to organizations, but it's also…
Hackers no longer rely solely on email when trying to infiltrate your organization. Social media, including LinkedIn, have become the new preferred method of attack for these criminals. This year,…
Multi-Factor Authentication (MFA) has become increasingly common both in business and personal use. Yet, despite MFA providing increased security, threat actors are using the availability of sophisticated technology and even…
Learn how Hackers are Bypassing MFA with Astonishing Accuracy Understanding and preparing for how cybercriminals are bypassing Multi-Factor Authentication (MFA) is imperative for protecting your organization. The Cybersecurity & Infrastructure Security…
Three days before the end of 2020 SlashNext Threat Labs observed a flurry of spear-phishing attacks targeting companies working to deliver Covid-19 vaccines and therapeutics to curb the pandemic. Many…
In a recent survey, security professionals in mid to large-sized organizations were asked how to mitigate phishing and malware risk. The answers revealed a mix of the strategies and a…
It’s been a year since states first enacted shelter in place orders, most employees began working outside their office networks at home. In 2020, phishing attacks grew 42%, according to new data…
Protected with 2FA? Think Again. Two-factor authentication (2FA) is certainly a best practice for corporate security, but cybercriminals are also quite good at defeating it, often without a user’s knowledge.…
Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers. Nearly half of all survey respondents (47%) reported spending up…
Earlier this year, SlashNext debuted “Phish Stories,” a videocast and podcast series during which cybersecurity experts discuss new zero-hour phishing attacks before a live audience of CISOs, CSOs and cybersecurity professionals. In…