Free Trial Request
Request a Demo

Resources

Discovery, Analysis, and Cybersecurity Intelligence

FEATURED RESOURCE

Defending Against Zero-Hour Social Engineering Threats with Modern Threat Intelligence

Defending Against Zero-Hour Social Engineering Threats with Modern Threat Intelligence

New kinds of phishing and social engineering tactics and direct-to-browser attack vectors are evading existing multi-level security controls. The introduction of next-gen antivirus technologies are making it harder for bad actors to deliver ... Read More

UPCOMING EVENTS

Future Con, San Diego

Future Con, San Diego

Start Date: June 5, 2019
Location: San Diego
Webinars
Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats. During this 30-minute on-demand webinar you’ll learn about TTPs for the new generation of evasive phishing threats and the benefits and use cases for real-time phishing threat intelligence.
Reports
A recent Aberdeen report finds the human element at the forefront of most phishing attacks. They simulated 1,400 phishing attacks and found that protecting your organization against phishing attacks requires a high-speed, highly automated approach.
Webinars
SlashNext and Dark Reading discuss the changing nature and methods of social engineering attacks and solutions to thwart these attacks.
Atif Cube Interview
Videos
With companies using more sophisticated security defenses such as SEGs, SWGs, NextGen AV and advanced endpoint security, hackers are going after the human attack surface with socially engineered attacks that evade existing defenses by design.
Threat Intelligence Report
Reports
Quarterly insights into the threats detected by our platform and analyzed by our security research team.
Data Sheets
Unlike other anti-phishing technologies, SlashNext patent-pending SEER technology uses virtual browsers to dynamically inspect page contents and server behavior to detect tens of thousands of new phishing URLs per day with extreme accuracy.
Reports
New phishing protection strategies and technologies to protect employees
White Papers
This report explores how phishing attacks trick victims with malicious browser extensions, credential stealing, technical support scams, rogue software, gift and prize scams.
White Papers
This whitepaper explores the top cybersecurity concerns that organizations face and will deep-dive into these issues and more: Security incidents; phishing threats coming from non-email sources; credential-stealing; points of vulnerability; use of machine learning in security defenses.
Reports
Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web
Webinars
Learn about new phishing attack vectors, fast-moving phishing sites, and how you can catch ...
Reports
Organizations are drowning in a sea of increasingly sophisticated cyber threats. And when it ...