Flaw Reinforces Browser Extensions as Potential Attack Vector

We took notice a couple of weeks ago when it was reported that a […]
The post Flaw Reinforces Browser Extensions as Potential Attack Vector appeared first on SlashNext.
The post Flaw Reinforces Browser Extensions as Potential Attack Vector appear… Continue reading Flaw Reinforces Browser Extensions as Potential Attack Vector

Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Anyone who is looking for a new career opportunity should keep in mind that […]
The post Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations appeared first on SlashNext.
The post Employment Phishing and Social… Continue reading Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Reports Indicate We The North Are Also We The Phished

As a company with offices in Northern California it should come as no surprise […]
The post Reports Indicate We The North Are Also We The Phished appeared first on SlashNext.
The post Reports Indicate We The North Are Also We The Phished appeared… Continue reading Reports Indicate We The North Are Also We The Phished

Demo of New Automated Phishing Attack That Hacks Two-Factor Authentication

We’ve written several blogs this year about the pros and cons of two-factor authentication […]
The post Demo of New Automated Phishing Attack That Hacks Two-Factor Authentication appeared first on SlashNext.
The post Demo of New Automated P… Continue reading Demo of New Automated Phishing Attack That Hacks Two-Factor Authentication

Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Phishing threats have transformed into sophisticated targeted attacks that go well beyond credential stealing. …
The post Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence appeared first… Continue reading Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising has recently made headlines thanks in part to a large Easter attack by …
The post Malvertising Bypasses Security with Straight to Browser Attacks appeared first on SlashNext.
The post Malvertising Bypasses Security with Straight to Brows… Continue reading Malvertising Bypasses Security with Straight to Browser Attacks

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we …
The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext.
The post 4 Phishing Attacks that Exploit Two-Factor Authenticati… Continue reading 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Credential Stealing Phishing Attacks Gaining Momentum

A growing and popular phishing attack is one designed to steal credentials – mainly …
The post Credential Stealing Phishing Attacks Gaining Momentum appeared first on SlashNext.
The post Credential Stealing Phishing Attacks Gaining Momentum app… Continue reading Credential Stealing Phishing Attacks Gaining Momentum

Phishing Attacks Are Prevalent During March Madness

March Madness is heading into its final weekend and if you followed any of …
The post Phishing Attacks Are Prevalent During March Madness appeared first on SlashNext.
The post Phishing Attacks Are Prevalent During March Madness appeared first on Secu… Continue reading Phishing Attacks Are Prevalent During March Madness

Scareware Underscores the Need for Real-Time Phishing Threat Intelligence

Scareware. Just the name itself is rather foreboding. In fact, this deceptive phishing tactic …
The post Scareware Underscores the Need for Real-Time Phishing Threat Intelligence appeared first on SlashNext.
The post Scareware Underscores the Need fo… Continue reading Scareware Underscores the Need for Real-Time Phishing Threat Intelligence