Hi [[ session.user.profile.firstName ]]

SlashNext

  • Date
  • Rating
  • Views
  • See What Phishing Threats You’re Missing--Live Demo
    See What Phishing Threats You’re Missing--Live Demo
    Mark McDaniel, Senior Director of Technical Services at SlashNext, Inc. Recorded: Apr 24 2019 29 mins
    SlashNext Real-Time Phishing Threat Intelligence Live Demo

    Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute demo you’ll see:

    Slashnext’s behavioral analysis approach that leverages our Session Emulation and Environment Reconnaissance™ (SEER) threat detection technology.

    Real-time threat intelligence covering five major phishing categories: credential stealing, scareware, rogue software, phishing exploits, social engineering scams, phishing callback C2s

    Real-Time Phishing Threat Intelligence that is more automated by evaluating many more characteristics of the site, so it’s able to render a definitive verdict, malicious or benign.

    A continuously updated list of zero-hour phishing URLs, Domains, IPs that can be used for blocking purposes
  • Understanding and Defending Against Zero-Hour Social Engineering Threats
    Understanding and Defending Against Zero-Hour Social Engineering Threats
    Hear from security expert Atif Mushtaq (founder and CEO of SlashNext) and Jan Liband, SlashNext CMO, to learn how your IT sec Recorded: Apr 15 2019 39 mins
    Threat actors are going after the human attack surface with new kinds of phishing and social engineering techniques, tactics, and procedures (TTPs). While credential stealing remains popular, new types of phishing and direct-to-browser attack vectors are evading existing multi-level security controls. Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute webinar you’ll learn about:

    - TTPs for the new generation of evasive phishing threats
    - What existing phishing threat intelligence feeds are missing
    - Benefits and use cases for real-time phishing threat intelligence
  • Catching Live Phishing Attacks
    Catching Live Phishing Attacks
    Atif Mushtaq, SlashNext Founder and CEO Recorded: Apr 4 2019 40 mins
    Learn about new phishing attack vectors, fast-moving phishing sites, and how you can catch them. According to Verizon’s 2018 Data Breach Investigations Report, phishing attacks are at the start of over 90% of data breaches and financial losses. Today's phishing attacks employ short-lived sites, most lasting just 4-8 hours. And attack vectors are expanding beyond email to social media, IM, ads, pop-ups, rogue browser extensions, and more. New attack methods exploit the human attack surface within targeted organizations and evade existing security defenses by design.

    In this webcast, you’ll learn:

    How the phishing attack landscape has changed
    How modern phishing attacks are designed to evade existing defenses
    What’s needed to catch live phishing attacks and protect your employees
    Featured Speaker

    Atif Mushtaq
    SlashNext Founder and CEO

    A noted security expert who has spent most of his career on the front lines of the war against cybercrime, Atif has worked with law enforcement and other global organizations to take down some of the world’s biggest malware networks. Atif is the former lead architect of FireEye’s core malware detection system and is the visionary behind SlashNext's innovative approach to real-time phishing site detection.

Embed in website or blog