Syndicated Blog

SlashNext
Detect, Block and Prevent Phishing Attacks Beyond Email
WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks

In this blog post, we delve into the emerging use of generative AI, including OpenAI’s ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Highlighting real cases from cybercrime ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
CISOs Increasingly Concerned About Mobile Threats

CISOs Increasingly Concerned About Mobile Threats

A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly concerned about ...
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning ...
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these ...
G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories

SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers each year ...
Five Types of Business Email Compromise Attacks and How to Prevent Them

Five Types of Business Email Compromise Attacks and How to Prevent Them

In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) latest 2022 report, which emphasized a steep and significant rise in Business Email Compromise ...
Latest FBI IC3 Report Reveals BEC and Crytpo Scams Top the List of the $10.3 Billion Losses in 2022

Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022

| | bec
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of ...
March Madness

The Downside to March Madness – a Busted Bracket and a Data Breach

Back in the 1930s, March Madness was used to describe the excitement and frenzy surrounding an Illinois high school basketball tournament. Over the years, the term has become associated with the frenetic ...
The SEG Conundrum. What's Right for My Organization?

The SEG Conundrum. What’s Right for My Organization?

| | bec, Email Protection
Secure Email Gateways (SEGs) have been around for a while and began as a powerful solution used to stop malicious emails from arriving in users’ mailboxes. The early SEGs were designed to ...