Guides

What Is Phishing? Types of Attacks and 6 Defensive Measures

Phishing is a form of fraud in which an attacker impersonates a reputable entity or person, via email or other means of communication. Attackers often use phishing emails to distribute...
Attack Trends

Ho Ho No! Beware of These Holiday Phishing Scams

In this blog, we review four phishing attacks to watch out for this holiday season....
Attack Trends

Perception Point Researchers Discover “Phishing in Motion” Video Scam

Perception Point researchers discover a 2-step phishing campaign that utilizes a video to execute its payload. ...
Attack Trends

Perception Point Researchers Discover Dropbox Phishing Campaign

A new 2-step phishing campaign runs rampant, utilizing Dropbox to achieve payload. ...
News

Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’

Phishing itself is not a new or a particularly complicated threat. But the emergence of  advanced phishing techniques – “DeepSea Phishing” – poses an entirely new challenge for enterprises....
News

Novel Phishing Method Bypasses Spam Filters Using Odd Links

Research by Perception Point reveals new type of phishing method exploits the gap in how browsers and email inboxes scan web domains....
News

Unusual links leveraged in novel phishing attack

Perception Point researchers discovered a low-effort phishing technique that was able to bypass advanced email security detection....
News

Novel Phishing Trick Uses Weird Links to Bypass Spam Filters

A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains....
Attack Trends

6 Types of Phishing Attacks & Real-Life Examples

Different types of phishing attacks come up every day. Learn how to identify each type and protect your enterprise....
Industry Insights

Techniques Used in 3 Types of Phishing

Different types of phishing use different techniques to ensure a successful attack. Learn how to identify them and keep your business secure....
Blog

Whaling vs. Spearphishing Attacks: What’s the Difference?

Spearphishing attacks are growing more rampant, but many mistake it for whaling phishing. Learn the differences between the two....
News

Crypto-related phishing and how to avoid it

In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency...
Attack Trends

What is Spear Phishing?

Learn how spear phishing tricks users into providing confidential information and ways to protect yourself against it....
Attack Trends

What is Trap Phishing?

Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap...
Blog

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks....
Attack Trends

How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the...
Attack Trends

What is Barrel Phishing?

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. ...
Attack Trends

What is Clone Phishing?

Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to...
Attack Trends

Spear Phishing Attack Campaign Uses a Microsoft Verified App and Abuses OAuth Request Links

Attackers are using a Microsoft verified app, abusing OAuth request links in order to gain full control of the victims’ mailbox. The spear phishing attack is specifically targeting CISOs and...
Attack Trends

Beware of Trending Phishing Attacks Spoofing Financial Institutions that Combine URL Evasion and Geofencing Techniques

Perception Point recently detected multiple high-volume phishing campaigns in which the attackers are using URL evasion and geofencing  techniques while spoofing a variety of worldwide banking institutions, notably Standard Bank,...
Attack Trends

A Spear Phishing Attack Campaign Spoofing Leading Email Clients Including Microsoft, Gmail, WebMail, and WorldClient

In this sophisticated spear phishing campaign, attackers, using social engineering techniques, attempted to lure unsuspecting victims to enter their login credentials to fake login portals impersonating Microsoft, Gmail, WebMail, and...
Attack Trends

Why an Advanced Malware Scanner is Necessary: Blockchain.Com Cryptocurrency Phishing Campaign Prompts Malware Download

This article investigates two distinct attack campaigns targeting cryptocurrency users that are currently trending at multiple organizations, and how phishing attacks are used to entice victims to download malware or...
News

Salesforce Email Service Used for Phishing Campaign

Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats...
Attack Trends

Microsoft Phishing Campaign Lures Victims to Call a Toll-free Number and Leave Payment Details

A phishing campaign impersonating Microsoft gets victims to voluntarily call a number and provide their credit card information to the attackers...
Attack Trends

Why Advanced Phishing Protection is Needed: Attackers Are Using Salesforce’s Mass Email Service to Perpetrate Phishing Attacks

A sophisticated phishing attack spoofing the Israeli Postal Service and leveraging Salesforce mass email service for malicious purposes....
Attack Trends

Beware! Sophisticated Vodafone Phishing Attack Is Doing The Rounds

Attackers are getting smarter, putting more users at risk: this phishing campaign spoofing Vodafone includes all the finer details ...
Attack Trends

Phishing Campaign for Stealing USPS Customers’ Credit Cards Details

A sophisticated attack spoofing the United States Postal Service lures unsuspected users to enter their personal information and credit card numbers....
Attack Trends

Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment

Be aware. Attackers are impersonating legitimate brands, attaching to emails an HTML file containing a fake log-in page, intended for harvesting credentials. To complete the disguise, they finish with redirecting...
Attack Trends

Netflix Phishing Scams Rise by 250% in 3 Months

The Perception Point IR Team found a major increase (250%) in the number of Netflix Phishing scams this quarter compared to last quarter....
Attack Trends

‘CEO Fraud’ Phishing Kit on the Rise

The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. ...
Attack Trends

Phishing Scams Hosted on Free Website and Form Building Tools Increases

With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And that's exactly what's been...
Attack Trends

BEC, Spear Phishing & Collaboration Examples in a single attack.

While it is a known fact that phishing, BEC, and collaboration-tool based attacks are becoming more and more prevalent, it is even more interesting to see all three trends within...
Blog

On-brand Phishing: When Attackers Use Your Assets Against You

A detailed, to-the-point analysis of the most phished brands in email attacks and the importance of asset-based protection as c. 50% of attacks are actually related to the targeted company...
Attack Trends

Top 4 Phishing Tricks for September-October 2020

Stay up to date with the latest phishing trends and tricks. We now focus on 4 points that can surely help you be prepared for the next attack....
Attack Trends

The Fake Collaboration: Phishing Microsoft Planner and Teams

Fake Alert! Attackers now phish for user's credentials using fake email and web pages of Microsoft Planner and Microsoft Teams. Read the full report to stay on top of the...
Attack Trends

A Phishing Link, Some Social Engineering and Evasion – The Foremost Recipe for Cybertheft

What happens if you take a pinch of social engineering, a grain of evasion, and throw some anonymization techniques into the mix? Well, a perfect recipe for phishing. Check this...
Attack Trends

“Accept Phishing Message” – The SendGrid Scheme

Attackers are ever-improving. See how they learned to leverage SendGrid to gain from two main benefits: evading email security measures and improve their trial and error process to improve their...
Attack Trends

The Triple Trouble: 3-Stage Phishing Attack.

Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and...
Attack Trends

Phishing Campaign Trend: Microsoft Teams.

In the following incident, it is very interesting to see how the attackers have improved their messaging and framework significantly to try trick the end-users. Just in the design there...
Attack Trends

Phishing Attempt Using Slack Referrer URL.

In this update, we will show how attackers are leveraging Slack referrer URL in order to lead victims to phishing pages, thus evading legacy solutions....
Attack Trends

New Phishing Campaign: “Remote-work” VPN Installation.

Overview. Due to the sudden remote-work situation, IT teams are deploying VPN’s for all their employees in order to ensure business continuity. VPN is one of the necessities of almost...
Attack Trends

Phishing Alert: GitHub Website Spoofing.

Over the last few days, Perception Point’s system has detected an increasing number of incidents that are attempting to steal GitHub user credentials. In this specific attack below, it appears that the...
Page

Spearphishing

Attack Vectors Phishing,Spear Phishing and Whaling 91% of all cybercrimes and cyber-attacks starting with a phishing email. A phishing attack is not a question of if – but when. Learn...
Attack Trends

COVID-19 Phishing Campaigns Alert

In this post, we discuss some of the COVID-19 phishing campaigns caught by our anti-phishing engine and analyzed by our IR team. ...
Attack Trends

Anti-Phishing Software – A Growing Necessity for Google Services

In this blog, we will show how attackers take their creativeness to the next level by leveraging Google services in order to orchestrate new types of phishing attacks. ...
Attack Trends

Campaign Alert: G Suite Phishing

Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage....
Attack Trends

Phishing Links are Moving to Email Attachments

In this post we discuss how attackers are putting embedded URLs inside email attachments instead of the email body to evade security filters....
Press

Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security

The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio...
Attack Trends

Takeaways from the CircleCI Incident

Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the...
Press

Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers

The integration provides crucial protection for businesses’ most vulnerable departments - help desks and customer support teams - preventing the most advanced threats sent by online users...
Guides

Understanding Account Takeover (ATO) and 9 Defensive Measures

What is Account Takeover (ATO)?  Account takeover (ATO) is a type of cybercrime in which an attacker gains unauthorized access to a victim’s online account. This can be done through...
Guides

Malware Protection: Types, Tools and Best Practices

What Is Malware Protection Malicious software (malware) is a program designed to perform malicious activities. For example, malware can be programmed to spy on browser activity, steal financial information, or...
Blog

Zendesk – Is It a One Way “Ticket” to Ransomland?

In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on...
Guides

Malware: Types, Examples, and How Modern Anti-Malware Works

What Is Malware?  Malware (malicious software) is designed to disrupt the normal functioning of a computer or other device. It is an umbrella term for viruses, trojan horses, and other...
Guides

Email Security: Threats, Solutions, and 8 Critical Best Practices

What Is Email Security?  Email is an essential part of organizational communication, and is leveraged by almost all companies across multiple devices and environments. Email can also be used to...
Attack Trends

The Rebranded Crypter: ScrubCrypt

In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware....
Guides

Advanced Persistent Threats: Warning Signs and 6 Prevention Tips

What is Advanced Persistent Threat? An Advanced Persistent Threat (APT) is a type of cyber attack in which an adversary gains unauthorized access to a network and remains undetected for...
Guides

Cybersecurity in 2023: Threats, Technologies, and Best Practices

What is Cybersecurity? Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage. It involves implementing measures to prevent...
Guides

Business Email Compromise (BEC): Examples, Process, and Defensive Measures

What Is Business Email Compromise (BEC)? Business email compromise (BEC) is a phishing scam involving a corporate email account, in which a threat actor attempts to manipulate a target into...
Resources

Advanced Browser Security: Browser Extension

DATASHEET: Advanced Browser Security Browser Extension How are you securing your organization’s native browsers?   Protect your endpoints with unmatched detection and prevention against phishing, ransomware, malware and zero-days.  ...
Page

Guides

Learning Center: Cybersecurity Guides What are the biggest security concerns regarding Google Drive?   Which defense measures should you implement to prevent BEC  attacks?   Get answers to these and...
Guides

Dropbox Security: Dropbox Basic vs. Dropbox Business

What Is Dropbox Security? Dropbox is a collaboration platform that allows users to share and contribute to files. As with any file-sharing system, it is important to ensure Dropbox security...
Guides

Google Drive Security Concerns & 9 Advanced Security Features

What Is Google Drive Security?  Google Drive is a free cloud-based storage service, with a paid business version offered as part of Google Workspace (formerly G Suite). The service allows...
Resources

SE Labs Email Security Services Report

Read the world’s first in-depth, public test of email security services vs. commodity and targeted attacks. Tested against some of the top known services in the industry....
Press

Perception Point Introduces New Partner Program Providing Partners With More Advanced Tools to Accelerate Resell Opportunities

Perception Point to boost partners’ loyalty and engagement with access to enhanced discounts, marketing resources, and robust marketing strategies....
Attack Trends

Beware: njRAT Malware Has Entered the Discord

In this blog post, we review a recent phishing campaign that leverages Discord CDN to host malicious files and lure unsuspecting users into becoming victims of the njRAT malware....
Press

Enterprises Spend $1,197 per Employee Annually to Address Increasingly Sophisticated and Successful Cyber-Attacks

Perception Point-Osterman report investigates the expanding threat landscape against email, browsers, and emerging cloud-based channels in enterprises. ...
News

Cybersecurity incidents cost organizations $1,197 per employee, per year

Cybersecurity is an expensive business. To prepare to address sophisticated threat actors, an enterprise needs to maintain a complete security operations center (SOC) filled with state-of-the-art technologies and experienced professionals...
Page

Malware detection lp

Attack Vectors Malware Detection Malware (short for “malicious software”) detection includes various types of threats: viruses, ransomware, spyware, worms, trojans, keyloggers, and many more. The most common ways for malware...
Page

Cloud Storage lp

Cloud Storage Security 81% of security leaders believe cloud storage apps are vulnerable to attack   Perception Point’s Advanced Cloud Storage Security Solution is the ONLY cloud storage security solution...
Page

Email Security

Email Security 91% of all cyber attacks start with an email.   Perception Point’s Advanced Email Security Solution is a next-gen email security software that prevents APTs, phishing, malware, ATO,...
Page

Web security lp

Browser Security Perception Point’s Advanced Browser  Security solution transforms the security of your native browsers, isolating, detecting and remediating all malicious threats from the web.   It also protects access...
News

The Limitations of Traditional Cybersecurity Solutions

As enterprises continue to be targeted by increasingly sophisticated threat actors, it is vital that they assess the efficacy of their legacy cybersecurity solutions and adapt to the burgeoning threat landscape accordingly....
Attack Trends

New Phone Scams Evade Most Email Security Solutions

In this blog we discuss how phone scams have evolved, appearing more legitimate and evading detection engines of many email security vendors....
Page

Advanced Security for Microsoft 365

Advanced Security for Microsoft 365 All-Around Defense for the Microsoft-empowered organization. Whether it is Exchange Online, collaboration apps like OneDrive or SharePoint, enterprise communication via Microsoft Teams, or the Azure...
News

Like a Moth to a Flame: Why the Browser Is Such a Tempting Target

What exactly should enterprises be looking for in their security solutions to ensure their workers and assets stay safe from browser-based threats?...
Attack Trends

Beware: 4 Advanced Attack Examples You Should Know About

In this post we cover four advanced attack examples you should look out for. ...
Blog

Behind Perception Point’s SE Labs Triple-A Award

How Perception Point became the top provider in SE Labs’ Enterprise 2022 Q2 test for Email Security Services....
Page

Perception Point’s Cyber Threat Detection Technology

Next-Gen Cyber Threat Detection Technology Protect your organization with unprecedented advanced threat detection across email, web browsers, and cloud collaboration apps.  One Detection Platform for Any Cyber Threat Protect against...
Attack Trends

Doenerium: It’s Not a Crime to Steal From Thieves

In this blog we review a sophisticated phishing campaign that uses the Doenerium malware to execute its payload. ...
Press

SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors

The integration consolidates, simplifies, and boosts advanced threat prevention and incident response across the organization’s endpoints, emails and cloud collaboration channels....
News

SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors

The integration consolidates, simplifies, and boosts advanced threat prevention and incident response across the organization's endpoints, emails and cloud collaboration channels...
Industry Insights

Karen Krivaa, Perception Point Shares How Organizations Can Combat Evolving Email Threats

Perception Point was recently named Best Email Security Solution by The Tech Ascension Awards....
News

Karen Krivaa, Perception Point Shares How Organizations Can Combat Evolving Email Threats

We spoke with Karen Krivaa, Perception Point about the email security challenges organizations are facing, how cloud has changed risk posture, and what organizations can do to ensure their email...
Attack Trends

Has Your Account Been Taken Over?

In this blog post we discuss how account takeover (ATO) attacks occur and what you should look out for to spot them....
News

Advanced Browser Security- Perception Point

Perception Point's Advanced Browser Security allows users to browse natively with no significant latency. It is compatible with all web browsers and all common browsers, and provides best-of-breed isolation for...
News

Black Hat Trip 2022 – Perception Point

Perception Point can isolate, detect, and remediate all attacks across both email, collaboration channels, and web browsers. ...
Page

Home Latest

Prevention Starts with Perception. Next-gen advanced email, web browser, and cloud apps security. ONE platform. ALL threats. Lightning fast. Zero overhead. Get Free Trial Selected Customers Prevention-based Security Across Your...
Press

Perception Point a Finalist in the 2022 SaaS Awards

Perception Point named finalist in International Software Awards Program, 2022 SaaS Awards....
Attack Trends

Behind the Attack: Remcos RAT

In this blog post, we break down the attack chain of a recent Remcos RAT malware campaign....
Press

Perception Point Recognized as the Best Email Security Solution by the 2022 Tech Ascension Awards

Perception Point has been recognized as the Best Email Security Solution by the 2022 Tech Ascension Awards....
Industry Insights

Browser Security: Threats, Solutions, and User Education

What are the top browser security threats, and how can you prevent them? Find out how security leaders can protect their organizations, here....
News

The One-Two Punch of Cybersecurity Solutions

Perception Point – a prevention-as-a-service company – recently launched their Web Security Solution, staking their stance on the resolution. ...
News

Perception Point Launches Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats

Managed solution lets users browse the web or access SaaS applications without exposing enterprise data to risk; providing highly advanced security for native browsers, while ensuring user productivity....
News

Perception Point launches Advanced Browser Security for eliminating web browser threats

Perception Point, a leading provider of advanced threat prevention across digital channels, released Perception Point Advanced Browser Security which is a new web security solution that adds enterprise-grade security to native Chrome and...
News

Perception Point Launches Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats

Perception Point, a leading provider of advanced threat prevention across digital channels, announced the release of Perception Point Advanced Browser Security, a new web security solution which adds enterprise-grade security to...
News

Perception Point Introduces Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats

Perception Point, a leading provider of advanced threat prevention across digital channels, announced today the release of Perception Point Advanced Browser Security, a new web security solution which adds enterprise-grade security to...
Page

Free Advanced Browser Security

Free Advanced Browser Security Securely access any risky website or document in an instantly-deployed secure browser Automatically open risky or uncategorized websites in a secure browser Explicitly open any suspicious...
News

Perception Point launches managed security service to help eliminate web browser threats

Prevention-as-a-service vendor says its new managed security service lets users browse the web or access SaaS applications without exposing enterprise data to risk. ...
News

New Perception Point solution adds enterprise security to Chrome and Edge

Email and collaboration security startup Perception Point Inc. has released a new web security solution that adds enterprise-grade security to native Chrome and Edge browsers....