Research

Malicious Office Macros: Detecting Similarity in the Wild

In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware. ...
Attack Trends

Revenge RAT Malware is back: From Microsoft Excel macros to Remote Access Trojan

In this blog post, we go through the attack chain of a recent Revenge RAT malware campaign. By going deeper and analyzing the attack chain, we can better understand the...
Research

Technical Analysis of CVE-2022-22583: Bypassing macOS System Integrity Protection (SIP)

Perception Point researchers discovered a vulnerability in macOS which allows attackers to bypass Apple’s SIP (System Integrity Protection) mechanism, and thus take full control over the system, provided that they...
Attack Trends

New Wave of Malicious
Excel 4.0 Macros

Excel 4.0 macros have been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely on...
Industry Insights

Two-Step Phishing Campaign Exploits Microsoft Office Forms

Attackers are abusing Microsoft Office Forms to launch sophisticated two-step phishing attacks. Office Forms are now being leveraged by threat actors to trick targeted users into divulging their Microsoft 365...
Industry Insights

Professionally Hooked: Microsoft Two-Step Phishing Campaign Targets LinkedIn Users

This blog highlights a new LinkedIn threat, one that combines breached accounts and an evasive 2-step phishing attack....
Research

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability

Perception Point detects a new multi-step QR code phishing campaign, exploiting open redirection vulnerabilities within Microsoft services....
Attack Trends

Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies 

Perception Point researchers discover new InfoStealer malware campaign targeting the hospitality industry....
Attack Trends

New Phone Scams Evade Most Email Security Solutions

In this blog we discuss how phone scams have evolved, appearing more legitimate and evading detection engines of many email security vendors....
Attack Trends

Behind the Attack: Remcos RAT

In this blog post, we break down the attack chain of a recent Remcos RAT malware campaign....
Industry Insights

Is VDI Cost Effective vs Win10 Laptops?

VDI involves hosting virtual desktops on centralized server and storage infrastructure. In this blog post we discuss the cost effectiveness of VDI versus Windows 10, and what factors need to...
Page

Windows Virtual Desktop vs Citrix: Choose One or Use Both?

What is Windows Virtual Desktop? Windows Virtual Desktop (WVD) is a cloud-based solution for application virtualization. Using WVD on Azure enables you to: Configure a fully scalable Windows 10 multi-session...