Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

SlashNext

SlashNext is transforming how organizations protect themselves from next-gen phishing and social engineering threats. Founded by Atif Mushtaq, the former lead architect of FireEye's core malware detection system, SlashNext has pioneered the industry's most powerful and most accurate phishing site detection technology. SlashNext enables enterprises to close the gaps in their anti-phishing defenses and to automate analysis of suspicious URLs to expedite threat hunting and phishing incident response. With SlashNext, enterprises can dramatically reduce the risk of business email compromise (BEC), credential stealing, IP theft, breaches, and costly remediation efforts.

Our Website: https://www.slashnext.com


Latest Content From SlashNext

Whitepaper: The Race is On--Stop Zero-Hour Phishing Attacks

by SlashNextApr 04, 2019

From mere minutes to the first user opens and clicks on malicious emails, attachments, and URLs, attackers hook virtually 100% of their phishing victims within the first 4 to 8 hours - by which time they have shut down 75% of their phishing URLs and moved on. With so much at stake based on this accelerating race against time, successful protection of your organization's email and websites against phishing attacks requires a high-speed, highly automated approach.

A recent Aberdeen report, Reducing the Risk of Phishing Attacks: The Race is On, finds the human element at the forefront of most phishing attacks. They simulated 1,400 phishing attacks and found that:

• The likelihood of the first user click on malicious emails occurring within 30 seconds was about 8%
• The likelihood of the first user click on malicious emails occurring within 60 seconds was about 30%
• The median time-to-first click on malicious emails was just 134 seconds


Whitepaper: Modern Threat Intelligence for Zero Hour Threats

by SlashNextApr 04, 2019

Modern threat intelligence that covers new types of phishing threats is essential for defending against previously unknown zero-hour threats with new kinds of social engineering and direct-to-browser attack vectors that are evading existing multi-level security controls. Next-gen antivirus and similar technologies are making it harder for bad actors to deliver malware successfully, so they have become more sophisticated in delivering phishing and social engineering attacks.

In this report you'll learn about:
• How the phishing threat landscape has changed
• Techniques, tactics, and procedures for the new generation of evasive phishing threats
• What is required for modern phishing threat detection
• Benefits and use cases for real-time phishing threat intelligence


Whitepaper: Threat Intelligence Report 2018

by SlashNextApr 04, 2019

Threat Intelligence Report highlights some of the threats and trends detected by our platform and analyzed by our security research team. Every day our system analyzes billions of data points across millions of sites and thousands of customer endpoints. It detects malicious phishing sites as well as the presence of malware and post-infection callbacks to Command and Control (C&C) servers. This allows us to analyze threats and tactics used at different stages of the cyber kill chain. We have created this report to provide insights and actionable intelligence to help readers better understand and manage protections against the changing threat landscape.
This report includes:

• The latest trends in malicious ISPs
• Top 10 social engineering attacks
• Top malicious ISPs, domain, and command and control attacks
• Analysis on Swrort fileless malware


Whitepaper: SlashNext Phishing Survey

by SlashNextApr 04, 2019

Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web The SlashNext 2018 Phishing Survey suggests a dangerous lack of understanding and gaps in protection against modern, fast-moving phishing attacks. The survey of cybersecurity decision-makers showed that most companies lack adequate safeguards against phishing threats on the web and many don't fully understand the prevalence and risks of this growing threat. As such, most organizations are left in the dark when it comes to understanding their exposure to modern phishing tactics and in evaluating what solutions are needed to keep employees protected and to reduce the risk of breaches.

Get key survey results, including:

• Nearly two-thirds of respondents cite shortfalls in employee awareness and training as their top concern for protecting workers against social engineering and phishing threats
• Nearly half of respondents experience 50 or more phishing attacks per month
• Four out of ten are concerned their current defenses are not reliably detecting phishing attacks


Whitepaper: Real-Time Phishing Threat Intelligence

by SlashNextApr 04, 2019

Through multiple sources, SlashNext proactively inspects millions of suspicious URLs daily. Unlike other anti-phishing technologies, SlashNext patent-pending SEER™ technology uses virtual browsers to dynamically inspect page contents and server behavior to detect tens of thousands of new phishing URLs per day with extreme accuracy. Together with fully automated URL re-checking and retirement, security teams get the most comprehensive, real-time phishing threat intelligence available.


Webcast: Understanding and Preventing Social Engineering Attacks

by SlashNextFeb 20, 2019

While cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing, "watering holes", and social network attacks – are  designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware. How can enterprises prevent this sort of attack? Can users be trained to recognize such exploits and avoid them? In this webcast, experts discuss the most effective methods of defending against social engineering attacks.