Join us to learn how SlashNext is the number one phishing protection service for iOS, Android, PC and Mac
Our Latest On-Demand Webinar
The H Files: Episode 3
In the third episode of The H Files: Devious Microsoft365 Phishing Campaigns Using Legitimate Services – How hackers gain access to your business, security expert Casey Lee and SlashNext’s CEO Patrick Harr share the forensics of recent phishing campaigns on legitimate Microsoft services.
The H Files: Episode 2
With cybercriminals constantly changing their methods to circumvent detection, current cybersecurity defenses can miss up to 65% of new and emerging email threats.
Hear from SlashNext security expert, Casey Lee and CEO Patrick Harr.
The H Files: Episode 1
Join security expert and Chief Product Officer, Atif Mushtaq and CEO Patrick Harr to explore the latest hacker techniques and how to stop these attacks from getting past current defenses.
Phish Stories: Episode 10 On-Demand
2021 was another year of record breaking ransomware attacks and payouts. Ransomware has increased with an attack happening every 11 seconds with global recovery costs exceeding $20B in 2021.
Watch security experts explore the tight relationship between phishing and ransomware on a 30-minute webinar to explore techniques hackers are using and what to look out for in 2022.
Phish Stories: Episode 9
Humans only need apps and browsers in the cloud to communicate at work and in every other aspect of life – video meetings, health charts, social life — every digital channel is susceptible. Fake login pages are no longer the only game in town; phishing can be delivered straight into browsers and apps, bypassing key security infrastructure.
Phish Stories: Episode 8
65% of anti-phishing S%!T can’t stop these sophisticated threats.
Learn why these threats are successful and how to stop them with SlashNext’s founder, Atif Mushtaq, SlashNext CEO Patrick Harr.
Killer Apps for Cortex XSOAR On-Demand
Get familiar with SlashNext’s award-winning killer applications designed specifically for XSOAR to automate incident response and brand reputation.
Phish Stories: Episode 7
Explore techniques hackers are using and real-life examples of how MitM, rogue apps, and attacks hiding on legitimate infrastructure attacks are getting past current defenses.
Phish Stories: Episode 6
Explore the tight relationship between phishing and ransomware with real-life examples of how phishing leads to ransomware.
Phish Stories: Episode 5
In this episode we’ll explore The Security and Privacy Conundrum in a BYOD World.
Phish Stories: Episode 4
In this episode, Breaking the MFA Myth, we’ll explore how hackers are bypassing MFA with astonishing accuracy.
Phish Stories: Episode 3
This on-demand webinar expands on the New Threats Menacing Microsoft 365 Users Today.
Phish Stories: Episode 2
See the Zero-Hour Attacks Hacking Humans Today and explore real case phishing examples.
Phish Stories: Episode 1
In this episode, The State of Phishing in 2021, we’ll explore real case examples, including the latest spear-phishing attacks on legitimate infrastructure.
Preventing Phishing 2.0 Attacks with Next-Gen Security Defense
This on-demand webinar with SlashNext CEO Patrick Harr and Argo Group CISO Paul Guerra discusses the changing phishing threat landscape targeting across mobile and endpoint devices.
It’s Time to Get Started with SlashNext
Learn how to leverage the industry’s best zero-hour phishing protection in your environment.