Read the company overview to learn more about how Perception Point provides unparalleled prevention of advanced cyber threats across all attack vectors.
Read the company overview to learn more about how Perception point provides unparalleled prevention of all attacks across email, web browsers and cloud collaboration apps.
Read the company overview to learn more about how Perception point provides unparalleled prevention of all attacks across email, web browsers and cloud collaboration apps.
Check out our webinar in cooperation with Forrester — “Rethinking Email Security: Why Traditional Approaches Fail and Why You Can’t Afford to Ignore it”
Read the company overview to learn how Perception Point provides unparalleled prevention of all attacks across email, web browsers and cloud collaboration apps.
In this blog post, we go through the attack chain of a recent Revenge RAT malware campaign. By going deeper and analyzing the attack chain, we can better understand the...
Perception Point researchers discovered a vulnerability in macOS which allows attackers to bypass Apple’s SIP (System Integrity Protection) mechanism, and thus take full control over the system, provided that they...
Excel 4.0 macros have been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely on...
Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade...
Attackers are abusing Microsoft Office Forms to launch sophisticated two-step phishing attacks. Office Forms are now being leveraged by threat actors to trick targeted users into divulging their Microsoft 365...
VDI involves hosting virtual desktops on centralized server and storage infrastructure. In this blog post we discuss the cost effectiveness of VDI versus Windows 10, and what factors need to...