
Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation
SlashNext Research Team | | Blov HTML Crypter, Email Protection, Link Phishing, malicious code, malicious links, Phishing, phishing sites
Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, ...

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...

GoIssue – The Tool Behind Recent GitHub Phishing Attacks
Daniel Kelley | | bec, breaches, credential stealing, cyberluffy, Email Protection, GetHub, GitLoker, GoIssue, malware attacks, Phishing, Phishing Attacks, repository hijacking
By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows attackers to extract email addresses from GitHub profiles and send bulk emails directly to ...

New Anti-Bot Services on the Dark Web Help Phishing Pages Bypass Google’s Red Page
Daniel Kelley | | anti-bot, Browser protection, cybercrime, cybercrime tools, dark web, google red page, limitless anti-bot, otus, Phishing, phishing pages, remove red, url scan
Novel anti-bot services are being advertised on the dark web, offering cybercriminals advanced tools to bypass Google’s protective ‘Red Page’ warnings in a concerning development for cybersecurity teams. These services represent the ...

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security
Barry Strauss | | Cloud Email Security, CTO Corner, Email Protection, secure email gateway, SEG, url rewriting
URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security
Barry Strauss | | Cloud Email Security, CTO Corner, Email Protection, secure email gateway, SEG, url rewriting
URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity
Barry Strauss | | Browser protection, CAPTCHA, CloudFlare, CTO Corner, obfuscated phishing scams, Product, project phantom, URL analysis, virtual browser
In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...

Project Phantom: Revolutionary Zero-Trust Virtual Stealth Browser URL Analysis that’s Changing the Game in Cybersecurity
Barry Strauss | | Browser protection, CAPTCHA, CloudFlare, CTO Corner, obfuscated phishing scams, Product, project phantom, URL analysis, virtual browser
In the ever-evolving landscape of cybersecurity, the cat-and-mouse game between defenders and attackers never ends. At SlashNext, we’ve been at the forefront of this battle, constantly innovating to stay ahead of sophisticated ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...