Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, demonstrating how cybercriminals leverage trusted enterprise solutions to deceive even the most vigilant users. Let’s break down this ... Read More
New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Barry Strauss | | CloudFlare, credential stealing, cybercrime, data theft, financial breach, FishXProxy, Malicious Payloads, Phishing, phishing toolkit
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground. With its array of advanced features, FishXProxy dismantles the technical barriers traditionally associated with phishing campaigns, making it ... Read More
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it has permeated various communication channels, including SMS, WhatsApp, and collaboration tools like Microsoft Teams, Slack and Zoom. This ... Read More
AI Everywhere: Key Takeaways from the Gartner Security & Risk Management Summit 2024
Barry Strauss | | AI, CTO Corner, Gartner, generative AI, generative ai gen ai, Security and Risk Management
The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations increasingly adopt AI for innovation and efficiency, it is crucial to understand the opportunities and challenges that come with this technology ... Read More
Malicious Use of QR Codes on the Rise Through Quishing Attacks
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The QR code’s design allowed it to store more information than the traditional barcodes that were used and could be quickly ... Read More
Today’s cybersecurity health checks must identify AI based threats. Does yours?
Barry Strauss | | AI, artificial intellignece, bec, business email compromise, ChatGPT, credential stealing, Email Protection, FBI, generative AI, human, Malware, Microsoft Outlook, Mobile Phishing, observability, Phishing, smishing, SMS, social engineering, spear-phishing, Threat Intelligence, vishing
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace with the new highly sophisticated AI phishing techniques used for Business Email Compromise (BEC), smishing, link and file-based ... Read More
Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims
Barry Strauss | | bec, btc, business email compromise, business text compromise, CEO fraud, deepfake, generative AI, human, Mobile, Mobile Phishing, Phishing, smishing, social engineering, social engineering scams
Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning tools to disperse misinformation for cybercriminal scams. It doesn’t take much for an audio recording of a voice ... Read More
G2 Places SlashNext in Top 3 for Integrated Cloud Email Security for 2023, #1 Ratings in Many Categories
Barry Strauss | | awards, bec, business email compromise, Email Protection, email security, g2, General
SlashNext has been named in the Top 3 list for Integrated Cloud Email Security Vendors by G2, the world’s largest and most trusted software marketplace used by 80 million software buyers each year. This recognition is decided by actual customer feedback on features and functionality as compared to competitive alternatives. Quarterly, ... Read More
Five Types of Business Email Compromise Attacks and How to Prevent Them
Barry Strauss | | Account Compromise, attorney impersonation, bec, BEC attacks, business email compromise, CEO fraud, data exfiltration, fake invoice schemes, FBI
In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) latest 2022 report, which emphasized a steep and significant rise in Business Email Compromise (BEC) growth. The FBI documented victim’s adjusted losses reaching over $2.7 billion for the year. The FBI added ... Read More
Latest FBI IC3 Report Reveals BEC and Crypto Scams Top the List of the $10.3 Billion Losses in 2022
The Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) has just published their 2022 Internet Crime Report. As expected, the annual report warns about the serious threat of Business Email Compromise (BEC) like 2021, but also reveals the growth of investment scams, which exceeded BEC losses ... Read More