Syndicated Blog

SlashNext
Complete Generative AI Security for Email, Mobile, and Browser
How to Fight Blov HTML Crypter Phishing

Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation

Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, ...
DocuSign impersonation attacks are exploiting government-vendor theft

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust

The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...
GoIssue specializes in phishing and repository hijacking

GoIssue – The Tool Behind Recent GitHub Phishing Attacks

By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows attackers to extract email addresses from GitHub profiles and send bulk emails directly to ...
Cybercriminal using anti-bot services to bypass Google Red Page

New Anti-Bot Services on the Dark Web Help Phishing Pages Bypass Google’s Red Page

Novel anti-bot services are being advertised on the dark web, offering cybercriminals advanced tools to bypass Google’s protective ‘Red Page’ warnings in a concerning development for cybersecurity teams. These services represent the ...
URL Rewriting

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security

URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...
URL Rewriting

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security

URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...
SOC user

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity

In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...
SOC user

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity

In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...