DoH and Phishing Risks. What You Need to Know Now
As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it…
As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it…
Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threat vectors, such as SMS, social media, browser extensions to attack through actions such as credential stealing, rogue software, scareware, fake virus alerts, and more.
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of Bitcoin phishing sites each day because cybercriminals see it as an easy way to make money. Here are a few examples.
With the rising popularity of iOS and Android devices for everything from sending a client an SMS to attending a Zoom call, it was only a matter of time before…
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in…
With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling…
Lightweight, cloud-powered endpoint solutions protect remote users from the new multi-vector phishing threat landscape At SlashNext, protecting organizations from advanced phishing threats isn’t a part-time job. It’s our full-time focus.…