CTO Corner

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security
Barry Strauss | | Cloud Email Security, CTO Corner, Email Protection, secure email gateway, SEG, url rewriting
URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security
Barry Strauss | | Cloud Email Security, CTO Corner, Email Protection, secure email gateway, SEG, url rewriting
URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity
Barry Strauss | | Browser protection, CAPTCHA, CloudFlare, CTO Corner, obfuscated phishing scams, Product, project phantom, URL analysis, virtual browser
In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity
Barry Strauss | | Browser protection, CAPTCHA, CloudFlare, CTO Corner, obfuscated phishing scams, Product, project phantom, URL analysis, virtual browser
In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical ...

CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
Stephen Kowski | | breaches, cisa, CrowdStrike, CTO Corner, General, Malware, malware attacks, Phishing, Phishing Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber ...