Frost Radar, SlashNext Email Security 2024

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape

In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email security measures amidst an ever-evolving threat landscape. With the proliferation of phishing attacks and ... Read More
CISA Issues Warning

CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber attacks. CISA’s Key Warnings CISA emphasized several critical points in their alert: Threat actors are taking advantage of ... Read More
Business Email Compromise

Understanding Business Email Compromise (BEC)

What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC is highly targeted and often involves impersonating a trusted individual or entity to trick employees into ... Read More
STORM-0539 Smishing compromises employees accounts

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems

We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat actor group known as STORM-0539 has been conducting sophisticated smishing campaigns to compromise employee accounts and gain unauthorized ... Read More
SlashNext Introduces Gen AI for Spam and Graymail

SlashNext Introduces Gen AI for Spam and Graymail

SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for detecting and filtering spam and graymail. It delivers unparalleled accuracy and precision with near-zero false positive rates, which ... Read More
The Growing Menace of Obfuscated Phishing Scams

From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams

In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of cyberattacks but rather how attackers ingeniously reinvent old tactics. A prime example of this is obfuscation—a method deeply ... Read More
Security Training Will Not Save You From Phishing Attacks

Think Security Training Will Save You From Phishing Attacks? Think Again!

What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics. As we delve into the anatomy of a typical phishing scam, it becomes apparent why these attacks not ... Read More
FBI IC3 2023 report shows record year for cybercrime

Evolving Cyber Threats: Insights and Strategies from the 2023 FBI IC3 Report

Latest FBI IC3 Report shows a record year for cybercrime: record-setting $12.5 billion in losses The 2023 FBI IC3 report reveals not just numbers but narratives that underscore the adaptability and cunning of today’s cyber adversaries. With a record-setting $12.5 billion in losses, a 22% increase from the previous year, ... Read More
Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls

“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have uncovered a dangerous new type of cyberattack in the wild that uses cloaked emails to trick machine learning tools into accepting malicious payload. The malicious payload in the email then ... Read More

Application Security Check Up