CISOs Increasingly Concerned About Mobile Threats

CISOs Increasingly Concerned About Mobile Threats

A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly concerned about mobile threats targeting employees and the impact to their organization.  The rise of smishing, spam text messages and ... Read More
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these devices have made them enticing targets for hackers. The utilization of personal devices for work introduces security vulnerabilities ... Read More

State of Phishing Report Reveals More Than 255 Million Attacks in 2022

SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of phishing attacks compared to 2021. The latest State of Phishing Report findings highlights ... Read More

Expert Guide to Microsoft 365 Email Threat Protection

With the demands of the modern workforce, there’s been an increased use of native cloud email protection, like Microsoft 365, in the last 12 months. This has led many security professionals to ask if Microsoft 365 Defender can provide enough threat coverage to protect their organization. They wonder if they ... Read More

Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites

The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These attacks target shoppers anxiously awaiting the amazing offers and discounts revealed during the two-day sale, and bad actors are ready to take advantage of the excitement. Right now, SlashNext has tens of thousands ... Read More

Man in the Middle Attacks: What are they anyway, and how to prevent them.

Man in the Middle (MitM) is a term used to describe a cyber-attack where the cybercriminal comes between with user and their application. In these attacks, a hacker will inject code to hijack the application to steal credentials or open a backdoor to their network. These attacks are very dangerous ... Read More
Ad Network Lure Page

Phishing + Ransomware—Why Multi-Channel Protection is Essential to Stop Both

| | Phishing, Ransomware
When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: Ransomware has continued its upward trend with an almost 13%increase–a rise as big as the last five years combined according to Verizon 2022 DBIR(Data Breach Investigations Report) The human ... Read More

Getting Intelligent About Browser Security

Fixing browser security with artificial intelligence Had you told me 30 years ago the first web browser would be the ancestor of most software interfaces, I’d have been skeptical. Of course, that was before most of us had an inkling of what the web would become. Even with that hindsight, ... Read More
Beware! It’s Not the IRS Texting, Emailing, or Calling You

Beware! It’s Not the IRS Texting, Emailing, or Calling You

There are many compelling reasons why tax returns are valuable to hackers, but all are related to monetary gain. Tax returns are dense with personal information, including social security numbers, dependents’ PII, property addresses, and bank account information. This information can be sold on the dark web or used in ... Read More
Astra Group Credential Stealing Threat

Threats Hiding Behind Trusted Microsoft Domains

Throughout 2021 there was a growing increase in cyber threats hosted on legitimate services like Microsoft Teams, OneDrive, SharePoint, and OneNote to deliver phishing campaigns. These domains’ trusted reputation enables cybercriminals to easily evade current detection technologies using domain reputation and blocklists like SEG, proxy, SASE, and endpoint security tools ... Read More