Malvertising on Legitimate Websites, Even The New York Times
SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website.
Protect iOS and Android users from mobile-centric phishing threats with a lightweight, cloud-powered agent.
Shield employees from live phishing sites with cloud-powered browser extensions for all major desktop browsers.
Self-Serve experience to see what your current solution is missing.
Full visibility and reporting to see high-risk users, timelines and forensics.
Turn existing network security controls into a real-time, phishing defense.
Automate abuse mailbox management with run-time analysis of suspicious URLs on-demand.
Protect your brand and reputation with real-time phishing defense APIs.
Make 50 API request a day using virtual browsers and patented SEER™ threat detection technology.
Patented behavioral phishing detection and machine learning to detect unknown threats with unmatched accuracy.
On-device natural language machine learning stops spear phishing where the URL is absent
Learn how to leverage the industry’s best zero-hour phishing protection and IR solutions in your environment.
Anti-phishing solutions delivered with extreme accuracy to accelerate your business growth
SlashNext partners with leading security technology providers to simplify use and deployment of our next-generation solutions
See how our technology empowers MSSPs with resources and tools to accelerate business growth
Explore solutions and product data sheets
View our archive of SlashNext news coverage
See what reviews say about SlashNext products
A Free, Self-Serve Experience to See What Your Current Solution is Missing
Company’s mission and awards
Our forward-looking leadership team
Career Opportunities at SlashNext
Explore SlashNext’s most recent press releases
Latest events in the world of cybersecurity and phishing threat intelligence
SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website.
SlashNext recently discovered a new malicious phishing threat that abuses Adobe’s open redirect services. Read our blog for details and how you can stop it.
Today’s phishing attacks are sophisticated and even the most seasoned IT professionals are falling victim. Here are five phishing attack methods that fall outside of the email inbox that you need to be aware of.
FACT: 30% of phishing is still getting through current defenses. How is your organization doing?