Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



SlashNext is transforming how organizations protect themselves from next-gen phishing and social engineering threats. Founded by Atif Mushtaq, the former lead architect of FireEye's core malware detection system, SlashNext has pioneered the industry's most powerful and most accurate phishing site detection technology. SlashNext enables enterprises to close the gaps in their anti-phishing defenses and to automate analysis of suspicious URLs to expedite threat hunting and phishing incident response. With SlashNext, enterprises can dramatically reduce the risk of business email compromise (BEC), credential stealing, IP theft, breaches, and costly remediation efforts.

Our Website:

Latest Content From SlashNext

Whitepaper: The Race is On: Stop Zero-Hour Phishing Attacks

by SlashNextSep 11, 2019

From mere minutes to the first user opens and clicks on malicious emails, attachments, and URLs, attackers hook virtually 100% of their phishing victims within the first 4 to 8 hours - by which time they have shut down 75% of their phishing URLs and moved on. With so much at stake based on this accelerating race against time, successful protection of your organization's email and websites against phishing attacks requires a high-speed, highly automated approach.

A recent Aberdeen report, Reducing the Risk of Phishing Attacks: The Race is On, finds the human element at the forefront of most phishing attacks. They simulated 1,400 phishing attacks and found that:

• The likelihood of the first user click on malicious emails occurring within 30 seconds was about 8%
• The likelihood of the first user click on malicious emails occurring within 60 seconds was about 30%
• The median time-to-first click on malicious emails was just 134 seconds

Whitepaper: Defending Against Zero-Hour Social Engineering Threats with Modern Threat Intelligence

by SlashNextSep 11, 2019

New kinds of phishing and social engineering tactics and direct-to-browser attack vectors are evading existing multi-level security controls. The introduction of next-gen antivirus technologies is making it harder for bad actors to deliver malware successfully, so they have become more sophisticated in delivering phishing and social engineering attacks. Threat intelligence that covers new types of phishing threats is essential for defending against previously unknown zero hour treats.

In this report you'll learn about:
• How the phishing threat landscape has changed
• Techniques, tactics, and procedures for the new generation of evasive phishing threats
• What is required for modern phishing threat detection
• Benefits and use cases for real-time phishing threat intelligence

Whitepaper: SlashNext Phishing Survey

by SlashNextSep 11, 2019

Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web

The SlashNext 2018 Phishing Survey suggests a dangerous lack of understanding and gaps in protection against modern, fast-moving phishing attacks. The survey of cybersecurity decision-makers showed that most companies lack adequate safeguards against phishing threats on the web and many don't fully understand the prevalence and risks of this growing threat. As such, most organizations are left in the dark when it comes to understanding their exposure to modern phishing tactics and in evaluating what solutions are needed to keep employees protected and to reduce the risk of breaches.

Get key survey results, including:

• Nearly two-thirds of respondents cite shortfalls in employee awareness and training as their top concern for protecting workers against social engineering and phishing threats
• Nearly half of respondents experience 50 or more phishing attacks per month
• Four out of ten are concerned their current defenses are not reliably detecting phishing attacks

Whitepaper: Real-Time Phishing Threat Intelligence

by SlashNextSep 11, 2019

Through multiple sources, SlashNext proactively inspects millions of suspicious URLs daily. Unlike other anti-phishing technologies, SlashNext patent-pending SEER™ technology uses virtual browsers to dynamically inspect page contents and server behavior to detect tens of thousands of new phishing URLs per day with extreme accuracy. Together with fully automated URL re-checking and retirement, security teams get the most comprehensive, real-time phishing threat intelligence available.

Whitepaper: Close Your Phishing Defense Gaps

by SlashNextSep 11, 2019

Despite multi-layer security controls and employee cyber awareness training, phishing and social engineering threats are still bypassing cyber defenses. Remote employees and BYOD users are often operating outside of network perimeter exposing users to more phishing threats from more attack vectors and teams are overwhelmed researching potentially malicious phishing URLs.

Close your phishing defense gaps by addressing three critical challenges.
• Operationalize real-time block-ready phishing threat feed
• Block endpoint access to malicious sites
• Automate phishing IR and URL analysis

Whitepaper: Threat Intelligence Report 2018

by SlashNextApr 04, 2019

Threat Intelligence Report highlights some of the threats and trends detected by our platform and analyzed by our security research team. Every day our system analyzes billions of data points across millions of sites and thousands of customer endpoints. It detects malicious phishing sites as well as the presence of malware and post-infection callbacks to Command and Control (C&C) servers. This allows us to analyze threats and tactics used at different stages of the cyber kill chain. We have created this report to provide insights and actionable intelligence to help readers better understand and manage protections against the changing threat landscape.
This report includes:

• The latest trends in malicious ISPs
• Top 10 social engineering attacks
• Top malicious ISPs, domain, and command and control attacks
• Analysis on Swrort fileless malware