Email Protection
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails
A hacker exploited a misconfiguration in Proofpoint's email protection platform to send millions of spoofed phishing emails from companies like IBM, Nike, and Disney looking to steal money and credit card information ...
Security Boulevard
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach
Jimmy Lin | SlashNext Threat Lab | | bec, Dave Gruber, Email Protection, Enterprise Strategy Group, ESG, generative AI, Industry Report, malicious links, smishing, social engineering, spear-phishing, WormGTPT
In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6-10 ...
The Tolly Group Report Highlights SlashNext’s Gen AI-Powered Email Security Prowess
Jimmy Lin | SlashNext Threat Lab | | bec, business email compromise, Cloud Email Security, Email Protection, Industry Report, tolly group, tolly report
In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors, with zero-hour Business Email Compromise (BEC) and advanced phishing attacks posing significant risks to organizations. A recent independent ...
Understanding Credential Phishing
Jimmy Lin | SlashNext Threat Lab | | credential phishing, credential stealing, CTO Corner, Email Protection, Ransomware, UnitedHealth
Credential phishing is a type of cyberattack where attackers attempt to deceive your employees into providing their sensitive information, such as their Microsoft usernames and passwords. What is not obvious is credential ...
Think Security Training Will Save You From Phishing Attacks? Think Again!
What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics ...
Threat Actors are Exercising New Attack Techniques to Bypass Machine Learning Security Controls
“Conversation Overflow” attacks are the latest attempt to get credential harvesting phishing emails into your inbox SlashNext threat researchers have uncovered a dangerous new type of cyberattack in the wild that uses ...
Malicious Use of QR Codes on the Rise Through Quishing Attacks
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The QR code’s ...
LinkedIn Smartlinks Attacks Target Microsoft Accounts
Wajahat Raja | | credential theft, cyber threat trends, cybersecurity awareness, Cybersecurity News, cybersecurity threats, Email Protection, email security, LinkedIn Security, LinkedIn Smart Links, Microsoft Account Security, Online Security Best Practices, Phishing Attacks, phishing prevention, social engineering, User Education
In the ever-evolving landscape of cybersecurity threats, hackers have once again employed a cunning strategy by exploiting LinkedIn’s Smart Links in phishing attacks, aiming to steal Microsoft account credentials. These sophisticated LinkedIn ...