Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
The Truth About Why Malicious Links Get Through Security

The Truth About Why Malicious Links Get Through Security

KNOWN FACT: Malicious links are hosted on legitimate services like Google, Microsoft, AWS (Amazon Web Services), Wix, GoDaddy and many others, and these services are thought safe by many security services. The ...

State of Phishing Report Reveals More Than 255 Million Attacks in 2022

SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% ...

Hackers Get Ready for Amazon Prime Days Shoppers with Thousands of Live Phishing Sites

The start of Amazon Prime Days on July 12 has prompted an increase in phishing attacks. These attacks target shoppers anxiously awaiting the amazing offers and discounts revealed during the two-day sale, ...

Man in the Middle Attacks: What are they anyway, and how to prevent them.

Man in the Middle (MitM) is a term used to describe a cyber-attack where the cybercriminal comes between with user and their application. In these attacks, a hacker will inject code to ...
Astra Group Credential Stealing Threat

Threats Hiding Behind Trusted Microsoft Domains

Throughout 2021 there was a growing increase in cyber threats hosted on legitimate services like Microsoft Teams, OneDrive, SharePoint, and OneNote to deliver phishing campaigns. These domains’ trusted reputation enables cybercriminals to ...

Did One Phish Take Down a Pipeline?

What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with the Colonial Pipeline attack, Ransomware is the number one cybersecurity threat to organizations, but it’s also the number ...
Phishing, the 3000 lb. Gorilla

Phishing, the 3000 lb. Gorilla

SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020 ...
™

Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Phishing threats have transformed into sophisticated targeted attacks that go well beyond credential stealing. ... The post Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing ...

Credential Stealing Phishing Attacks Gaining Momentum

A growing and popular phishing attack is one designed to steal credentials – mainly ... The post Credential Stealing Phishing Attacks Gaining Momentum appeared first on SlashNext ...