cyberthreats

Small Businesses Boosting Cybersecurity as Threats Grow: ITRC
A report by the Identity Theft Resource Center found that while the number of small businesses hit by a cyberattack and the amount of losses continues to grow, companies are adopting stronger ...
Security Boulevard

Defending Democracy From Cyber Attacks in 2024
Cyberattacks during the 2016 U.S. presidential election exposed vulnerabilities in voter databases across 21 states, marking a stark warning about the fragility of our electoral systems ...
Security Boulevard

How to Maximize Network Security With AI and ML
Abdul Qayyum Mohammed | | ai drive defenses, Artificial Intelligence, Cybersecurity, cyberthreats, machine learning, Network Security, threat detection, Threat Mitigation
There is an increased focus on how advances in artificial intelligence (AI) and machine learning (ML) can negatively impact network security ...
Security Boulevard

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Jimmy Lin | SlashNext Threat Lab | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

Remote Rigor: Safeguarding Data in the Age of Digital Nomads
Digital nomads go where the wind takes them around the globe, often working from coffee shops, co-working locations or public libraries. They rely on connecting to their work life via their mobile ...
Security Boulevard

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, gift card scams, Mobile, Phishing, smishing, social engineering, social engineering scams
We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...

SlashNext Introduces Gen AI for Spam and Graymail
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, generative AI, graymail, Phishing, Product, Spam
SlashNext introduced a groundbreaking service, SlashNext Gen AI for Spam and Graymail, this week. This service is the first of its kind to use a generative AI large language model (LLM) for ...
Palo Alto Zero-Day Attack: PAN-OS Flaw Actively Exploited
Wajahat Raja | | CommandInjection, CVE20243400, cyberattack, Cybersecurity News, CybersecurityVulnerability, cyberthreats, exploitation, GlobalProtect, networksecurity, paloaltonetworks, PANOS, PatchManagement, SecurityMitigation, ZeroDayAttack
Palo Alto Networks, a leading cybersecurity company, has recently issued a warning about a critical vulnerability in its PAN-OS software, specifically affecting its GlobalProtect gateways. The Palo Alto zero-day attack flaw, identified ...
BatBadBut Vulnerability Exposes Windows Systems To Attacks
Wajahat Raja | | BatBadBut, CommandInjection, CreateProcessFunction, CVE202424576, CVSSScore, Cybersecurity News, CybersecurityVulnerability, cyberthreats, FlattSecurity, InputValidation, RustLibrary, RustUpdate, SecurityAdvisory, SoftwareSecurity, WindowsSecurity
A critical flaw has been discovered in the Rust standard library that could lead to serious command injection attacks against Windows users. The BatBadBut vulnerability, tracked as CVE-2024-24576, carries the highest possible ...