CTO Corner
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical ...
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
Stephen Kowski | | breaches, cisa, CrowdStrike, CTO Corner, General, Malware, malware attacks, Phishing, Phishing Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber ...
AI Everywhere: Key Takeaways from the Gartner Security & Risk Management Summit 2024
Barry Strauss | | AI, CTO Corner, Gartner, generative AI, generative ai gen ai, Security and Risk Management
The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations increasingly adopt AI ...
Understanding Credential Phishing
Jimmy Lin | SlashNext Threat Lab | | credential phishing, credential stealing, CTO Corner, Email Protection, Ransomware, UnitedHealth
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential ...
Understanding Business Email Compromise (BEC)
What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide ...
Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, gift card scams, Mobile, Phishing, smishing, social engineering, social engineering scams
We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...
SlashNext Introduces Gen AI for Spam and Graymail
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, generative AI, graymail, Phishing, Product, Spam
SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for ...
From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams
In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of ...
Think Security Training Will Save You From Phishing Attacks? Think Again!
What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics ...