Varonis Acquires Email Security Provider SlashNext to Enhance BEC Defenses

Varonis, a leader in data security and analytics, has acquired SlashNext, an email security provider specializing in advanced phishing detection and protection. This strategic acquisition aims to bolster Varonis' capabilities in defending against Business Email Compromise (BEC) attacks, a growing threat in the cybersecurity landscape. SlashNext's technology leverages AI and machine learning to detect and block sophisticated phishing attempts in real-time, enhancing email security for enterprises. The integration of SlashNext's solutions into Varonis' platform will provide customers with comprehensive protection against email-based threats, including spear-phishing, credential theft, and malware delivery. This move reflects the increasing importance of securing email communications as cybercriminals continue to exploit this vector for financial fraud and data breaches. Varonis' expanded portfolio now offers a more robust defense mechanism that combines data security with proactive threat detection, helping organizations mitigate risks associated with BEC and other email-centric attacks. The acquisition underscores the trend of cybersecurity companies consolidating expertise to address complex threat environments and deliver integrated security solutions. Enterprises can expect enhanced visibility, faster incident response, and improved threat intelligence as a result of this integration, ultimately strengthening their overall security posture against evolving cyber threats.

This Cyber News was published on www.darkreading.com. Publication date: Wed, 03 Sep 2025 12:05:06 +0000


Cyber News related to Varonis Acquires Email Security Provider SlashNext to Enhance BEC Defenses

Varonis Acquires Email Security Provider SlashNext to Enhance BEC Defenses - Varonis, a leader in data security and analytics, has acquired SlashNext, an email security provider specializing in advanced phishing detection and protection. This strategic acquisition aims to bolster Varonis' capabilities in defending against ...
3 hours ago Darkreading.com
Concerned About Business Email Compromise? 4 Technologies That Can Help - Business email compromise is a sophisticated form of cybercrime that targets commercial, governmental and non-profit organizations. The cybercriminal impersonates a senior executive or a key vendor and sends an email to an unsuspecting employee with ...
1 year ago Securityboulevard.com
Varonis Introduces Athena AI to Transform Data Security and Incident Response - Athena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams protect data - from visibility to action. Athena AI is embedded within the Varonis Data Security Platform and appears in ...
1 year ago Bleepingcomputer.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
10 months ago Esecurityplanet.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
2 months ago Cybersecuritynews.com
10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
6 months ago Cybersecuritynews.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
1 year ago Cybersecuritynews.com
Varonis enhances DSPM capabilities with Azure and AWS support - Varonis Systems has expanded capabilities for cloud databases and object storage in AWS and Azure. This release accelerates customers' data security posture management initiatives with deeper risk visibility, advanced threat detection, and automated ...
1 year ago Helpnetsecurity.com
CyberCrime & Doing Time: Identification Documents: an Obsolete Fraud Countermeasure - When I'm talking to bankers and other fraud fighters, I often mention how easy it is for a criminal to obtain a Drivers License bearing any information they desire. In the new case, Brianna Mills, a 28-year old bank teller in Loganville, Georgia ...
1 year ago Garwarner.blogspot.com
10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
1 month ago Cybersecuritynews.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
1 year ago Esecurityplanet.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
5 months ago Cybersecuritynews.com
Essential Email and Internet Safety Tips for College Students - Your email is one of the most important digital assets and identities because it helps you create accounts on other platforms. Securing your email requires you to pay attention to your passwords, gadgets, and the links you engage with. The places you ...
1 year ago Securityboulevard.com
How to Encrypt Emails in Outlook? - If you are sending out a confidential email and are scared of its content getting tampered with in transit, then you should learn how to encrypt an email in Outlook. As of 2023, the global email encryption market size is USD 6.2 billion, which is ...
1 year ago Securityboulevard.com
VPN for Your Phone: Key to Global Email Security While Traveling - You'll need to enter the details of your VPN connection, including the VPN name, type, server address, and any required authentication credentials. One essential way to use a VPN is to protect your email communications. A VPN can be side-loaded for ...
1 year ago Securityboulevard.com
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org
Security Boulevard - With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as Google, Yahoo, and Microsoft have doubled their email security efforts. DMARC builds on two existing email authentication technologies: Sender Policy ...
1 year ago Securityboulevard.com
New SharePoint flaws help hackers evade detection when stealing files - Researchers have discovered two techniques that could enable attackers to bypass audit logs or generate less severe entries when downloading files from SharePoint. Microsoft SharePoint is a web-based collaborative platform that integrates with ...
1 year ago Bleepingcomputer.com
Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023 - We'll examine the rapid proliferation of xIoT devices throughout all industries and the crucial quest in maintaining their security. In a digital landscape where the security of our data remains vital, the emergence of quantum computing poses an ...
1 year ago Cyberdefensemagazine.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
6 months ago Bleepingcomputer.com
What is an email signature? - An email signature - or signature block or signature file - is the block of text that appears at the end of an email message that provides more information about the sender. This can include details such as the sender's full name, occupation or job ...
1 year ago Techtarget.com
Navigating Cloud Security: A Comparative Analysis of IaaS, PaaS, and SaaS - In the era of digital transformation, businesses are increasingly leveraging cloud computing services to enhance agility, scalability, and efficiency. The paramount concern for organizations considering a move to the cloud is the security of their ...
1 year ago Cybersecurity-insiders.com

Cyber Trends (last 7 days)