Resources
Discovery, analysis and cybersecurity intelligence.
Featured REPORT
URL Scanning vs. URL Analysis and Enrichment
Most security teams seek to know if URLs in emails, network, or endpoint traffic are malicious. In many cases, they use URL scanning services, which typically involve a look-up database of known threats. Security analysts and threats researchers performing phishing incident response and threat hunting may also utilize URL enrichment services, either manually or through automated playbooks.
Understand the difference and why it matters.


Webinar
SlashNext and Cortex XSOAR Webinar: Automate Phishing Detection and Remediation for O365
Join Cortex and SlashNext for a webinar on automating phishing on-demand URL analysis as part of …

Webinar
ThreatConnect and SlashNext : Automating Abuse Inbox Management as Part of Phishing IR
On-Demand Webinar With ThreatConnect’s automation features and definitive phishing URL analysis f…

Webinar
Catching Live Phishing Attacks
New phishing attack vectors, fast-moving phishing sites. Learn how you can catch them.

Webinar
Understanding and Preventing Social Engineering Attacks
SlashNext and Dark Reading brought their experts together to discuss the changing nature and meth…

Webinar
Real Time Phishing Threat Intelligence Webinar
Threat intelligence that covers new types of phishing threats is essential for understanding and …

It’s Time to Get Started with SlashNext
Experience the difference with broad phishing threat coverage and automated delivery.