Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks

Over the course of 2018 one industry that has been struck hard with cybersecurity […]
The post Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks appeared first on SlashNext.
The post Lack of Focus on Security Makes… Continue reading Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks

Weaponized Documents: It’s Just a Matter of Time Before One is Opened

Protecting the enterprise from today’s increasingly sophisticated threats such as fileless documents and PDF …
The post Weaponized Documents: It’s Just a Matter of Time Before One is Opened appeared first on SlashNext.
The post Weaponized… Continue reading Weaponized Documents: It’s Just a Matter of Time Before One is Opened

Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Phishing threats have transformed into sophisticated targeted attacks that go well beyond credential stealing. …
The post Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence appeared first… Continue reading Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising has recently made headlines thanks in part to a large Easter attack by …
The post Malvertising Bypasses Security with Straight to Browser Attacks appeared first on SlashNext.
The post Malvertising Bypasses Security with Straight to Brows… Continue reading Malvertising Bypasses Security with Straight to Browser Attacks

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we …
The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext.
The post 4 Phishing Attacks that Exploit Two-Factor Authenticati… Continue reading 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Credential Stealing Phishing Attacks Gaining Momentum

A growing and popular phishing attack is one designed to steal credentials – mainly …
The post Credential Stealing Phishing Attacks Gaining Momentum appeared first on SlashNext.
The post Credential Stealing Phishing Attacks Gaining Momentum app… Continue reading Credential Stealing Phishing Attacks Gaining Momentum

Phishing Attacks Are Prevalent During March Madness

March Madness is heading into its final weekend and if you followed any of …
The post Phishing Attacks Are Prevalent During March Madness appeared first on SlashNext.
The post Phishing Attacks Are Prevalent During March Madness appeared first on Secu… Continue reading Phishing Attacks Are Prevalent During March Madness

Scareware Underscores the Need for Real-Time Phishing Threat Intelligence

Scareware. Just the name itself is rather foreboding. In fact, this deceptive phishing tactic …
The post Scareware Underscores the Need for Real-Time Phishing Threat Intelligence appeared first on SlashNext.
The post Scareware Underscores the Need fo… Continue reading Scareware Underscores the Need for Real-Time Phishing Threat Intelligence

Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection

Today, all modern browsers such as Chrome, Edge, Firefox, and Safari provide third-party developers …
The post Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection appeared first on SlashNext.
Continue reading Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection