Guides
What Is Phishing? Types of Attacks and 6 Defensive Measures
Phishing is a form of fraud in which an attacker impersonates a reputable entity or person, via email or other means of communication. Attackers often use phishing emails to distribute...
Attack Trends
Ho Ho No! Beware of These Holiday Phishing Scams
In this blog, we review four phishing attacks to watch out for this holiday season....
Attack Trends
Perception Point Researchers Discover “Phishing in Motion” Video Scam
Perception Point researchers discover a 2-step phishing campaign that utilizes a video to execute its payload. ...
Attack Trends
Perception Point Researchers Discover Dropbox Phishing Campaign
A new 2-step phishing campaign runs rampant, utilizing Dropbox to achieve payload. ...
News
Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’
Phishing itself is not a new or a particularly complicated threat. But the emergence of advanced phishing techniques – “DeepSea Phishing” – poses an entirely new challenge for enterprises....
News
Novel Phishing Method Bypasses Spam Filters Using Odd Links
Research by Perception Point reveals new type of phishing method exploits the gap in how browsers and email inboxes scan web domains....
News
Unusual links leveraged in novel phishing attack
Perception Point researchers discovered a low-effort phishing technique that was able to bypass advanced email security detection....
News
Novel Phishing Trick Uses Weird Links to Bypass Spam Filters
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains....
Attack Trends
6 Types of Phishing Attacks & Real-Life Examples
Different types of phishing attacks come up every day. Learn how to identify each type and protect your enterprise....
Industry Insights
Techniques Used in 3 Types of Phishing
Different types of phishing use different techniques to ensure a successful attack. Learn how to identify them and keep your business secure....
Blog
Whaling vs. Spearphishing Attacks: What’s the Difference?
Spearphishing attacks are growing more rampant, but many mistake it for whaling phishing. Learn the differences between the two....
News
Crypto-related phishing and how to avoid it
In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency...
Attack Trends
What is Spear Phishing?
Learn how spear phishing tricks users into providing confidential information and ways to protect yourself against it....
Attack Trends
What is Trap Phishing?
Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap...
Blog
How to Prevent Phishing Attacks
Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks....
Attack Trends
How to Conduct a Phishing Attack in a 5 Easy Steps
Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the...
Attack Trends
What is Barrel Phishing?
Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. ...
Attack Trends
What is Clone Phishing?
Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to...
Attack Trends
Spear Phishing Attack Campaign Uses a Microsoft Verified App and Abuses OAuth Request Links
Attackers are using a Microsoft verified app, abusing OAuth request links in order to gain full control of the victims’ mailbox. The spear phishing attack is specifically targeting CISOs and...
Attack Trends
Beware of Trending Phishing Attacks Spoofing Financial Institutions that Combine URL Evasion and Geofencing Techniques
Perception Point recently detected multiple high-volume phishing campaigns in which the attackers are using URL evasion and geofencing techniques while spoofing a variety of worldwide banking institutions, notably Standard Bank,...
Attack Trends
A Spear Phishing Attack Campaign Spoofing Leading Email Clients Including Microsoft, Gmail, WebMail, and WorldClient
In this sophisticated spear phishing campaign, attackers, using social engineering techniques, attempted to lure unsuspecting victims to enter their login credentials to fake login portals impersonating Microsoft, Gmail, WebMail, and...
Attack Trends
Why an Advanced Malware Scanner is Necessary: Blockchain.Com Cryptocurrency Phishing Campaign Prompts Malware Download
This article investigates two distinct attack campaigns targeting cryptocurrency users that are currently trending at multiple organizations, and how phishing attacks are used to entice victims to download malware or...
News
Salesforce Email Service Used for Phishing Campaign
Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats...
Attack Trends
Microsoft Phishing Campaign Lures Victims to Call a Toll-free Number and Leave Payment Details
A phishing campaign impersonating Microsoft gets victims to voluntarily call a number and provide their credit card information to the attackers...
Attack Trends
Why Advanced Phishing Protection is Needed: Attackers Are Using Salesforce’s Mass Email Service to Perpetrate Phishing Attacks
A sophisticated phishing attack spoofing the Israeli Postal Service and leveraging Salesforce mass email service for malicious purposes....
Attack Trends
Beware! Sophisticated Vodafone Phishing Attack Is Doing The Rounds
Attackers are getting smarter, putting more users at risk: this phishing campaign spoofing Vodafone includes all the finer details ...
Attack Trends
Phishing Campaign for Stealing USPS Customers’ Credit Cards Details
A sophisticated attack spoofing the United States Postal Service lures unsuspected users to enter their personal information and credit card numbers....
Attack Trends
Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment
Be aware. Attackers are impersonating legitimate brands, attaching to emails an HTML file containing a fake log-in page, intended for harvesting credentials. To complete the disguise, they finish with redirecting...
Attack Trends
Netflix Phishing Scams Rise by 250% in 3 Months
The Perception Point IR Team found a major increase (250%) in the number of Netflix Phishing scams this quarter compared to last quarter....
Attack Trends
‘CEO Fraud’ Phishing Kit on the Rise
The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. ...
Attack Trends
Phishing Scams Hosted on Free Website and Form Building Tools Increases
With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And that's exactly what's been...
Attack Trends
BEC, Spear Phishing & Collaboration Examples in a single attack.
While it is a known fact that phishing, BEC, and collaboration-tool based attacks are becoming more and more prevalent, it is even more interesting to see all three trends within...
Blog
On-brand Phishing: When Attackers Use Your Assets Against You
A detailed, to-the-point analysis of the most phished brands in email attacks and the importance of asset-based protection as c. 50% of attacks are actually related to the targeted company...
Attack Trends
Top 4 Phishing Tricks for September-October 2020
Stay up to date with the latest phishing trends and tricks. We now focus on 4 points that can surely help you be prepared for the next attack....
Attack Trends
The Fake Collaboration: Phishing Microsoft Planner and Teams
Fake Alert! Attackers now phish for user's credentials using fake email and web pages of Microsoft Planner and Microsoft Teams. Read the full report to stay on top of the...
Attack Trends
A Phishing Link, Some Social Engineering and Evasion – The Foremost Recipe for Cybertheft
What happens if you take a pinch of social engineering, a grain of evasion, and throw some anonymization techniques into the mix? Well, a perfect recipe for phishing. Check this...
Attack Trends
“Accept Phishing Message” – The SendGrid Scheme
Attackers are ever-improving. See how they learned to leverage SendGrid to gain from two main benefits: evading email security measures and improve their trial and error process to improve their...
Attack Trends
The Triple Trouble: 3-Stage Phishing Attack.
Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and...
Attack Trends
Phishing Campaign Trend: Microsoft Teams.
In the following incident, it is very interesting to see how the attackers have improved their messaging and framework significantly to try trick the end-users. Just in the design there...
Attack Trends
Phishing Attempt Using Slack Referrer URL.
In this update, we will show how attackers are leveraging Slack referrer URL in order to lead victims to phishing pages, thus evading legacy solutions....
Attack Trends
New Phishing Campaign: “Remote-work” VPN Installation.
Overview. Due to the sudden remote-work situation, IT teams are deploying VPN’s for all their employees in order to ensure business continuity. VPN is one of the necessities of almost...
Attack Trends
Phishing Alert: GitHub Website Spoofing.
Over the last few days, Perception Point’s system has detected an increasing number of incidents that are attempting to steal GitHub user credentials. In this specific attack below, it appears that the...
Page
Spearphishing
Attack Vectors Phishing,Spear Phishing and Whaling 91% of all cybercrimes and cyber-attacks starting with a phishing email. A phishing attack is not a question of if – but when. Learn...
Attack Trends
COVID-19 Phishing Campaigns Alert
In this post, we discuss some of the COVID-19 phishing campaigns caught by our anti-phishing engine and analyzed by our IR team. ...
Attack Trends
Anti-Phishing Software – A Growing Necessity for Google Services
In this blog, we will show how attackers take their creativeness to the next level by leveraging Google services in order to orchestrate new types of phishing attacks. ...
Attack Trends
Campaign Alert: G Suite Phishing
Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage....
Attack Trends
Phishing Links are Moving to Email Attachments
In this post we discuss how attackers are putting embedded URLs inside email attachments instead of the email body to evade security filters....
Press
Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security
The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio...
Attack Trends
Takeaways from the CircleCI Incident
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the...
Press
Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers
The integration provides crucial protection for businesses’ most vulnerable departments - help desks and customer support teams - preventing the most advanced threats sent by online users...
Guides
Understanding Account Takeover (ATO) and 9 Defensive Measures
What is Account Takeover (ATO)? Account takeover (ATO) is a type of cybercrime in which an attacker gains unauthorized access to a victim’s online account. This can be done through...
Guides
Malware Protection: Types, Tools and Best Practices
What Is Malware Protection Malicious software (malware) is a program designed to perform malicious activities. For example, malware can be programmed to spy on browser activity, steal financial information, or...
Blog
Zendesk – Is It a One Way “Ticket” to Ransomland?
In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on...
Guides
Malware: Types, Examples, and How Modern Anti-Malware Works
What Is Malware? Malware (malicious software) is designed to disrupt the normal functioning of a computer or other device. It is an umbrella term for viruses, trojan horses, and other...
Guides
Email Security: Threats, Solutions, and 8 Critical Best Practices
What Is Email Security? Email is an essential part of organizational communication, and is leveraged by almost all companies across multiple devices and environments. Email can also be used to...
Attack Trends
The Rebranded Crypter: ScrubCrypt
In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware....
Guides
Advanced Persistent Threats: Warning Signs and 6 Prevention Tips
What is Advanced Persistent Threat? An Advanced Persistent Threat (APT) is a type of cyber attack in which an adversary gains unauthorized access to a network and remains undetected for...
Guides
Cybersecurity in 2023: Threats, Technologies, and Best Practices
What is Cybersecurity? Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage. It involves implementing measures to prevent...
Guides
Business Email Compromise (BEC): Examples, Process, and Defensive Measures
What Is Business Email Compromise (BEC)? Business email compromise (BEC) is a phishing scam involving a corporate email account, in which a threat actor attempts to manipulate a target into...
Resources
Advanced Browser Security: Browser Extension
DATASHEET: Advanced Browser Security Browser Extension How are you securing your organization’s native browsers? Protect your endpoints with unmatched detection and prevention against phishing, ransomware, malware and zero-days. ...
Page
Guides
Learning Center: Cybersecurity Guides What are the biggest security concerns regarding Google Drive? Which defense measures should you implement to prevent BEC attacks? Get answers to these and...
Guides
Dropbox Security: Dropbox Basic vs. Dropbox Business
What Is Dropbox Security? Dropbox is a collaboration platform that allows users to share and contribute to files. As with any file-sharing system, it is important to ensure Dropbox security...
Guides
Google Drive Security Concerns & 9 Advanced Security Features
What Is Google Drive Security? Google Drive is a free cloud-based storage service, with a paid business version offered as part of Google Workspace (formerly G Suite). The service allows...
Resources
SE Labs Email Security Services Report
Read the world’s first in-depth, public test of email security services vs. commodity and targeted attacks. Tested against some of the top known services in the industry....
Press
Perception Point Introduces New Partner Program Providing Partners With More Advanced Tools to Accelerate Resell Opportunities
Perception Point to boost partners’ loyalty and engagement with access to enhanced discounts, marketing resources, and robust marketing strategies....
Attack Trends
Beware: njRAT Malware Has Entered the Discord
In this blog post, we review a recent phishing campaign that leverages Discord CDN to host malicious files and lure unsuspecting users into becoming victims of the njRAT malware....
Press
Enterprises Spend $1,197 per Employee Annually to Address Increasingly Sophisticated and Successful Cyber-Attacks
Perception Point-Osterman report investigates the expanding threat landscape against email, browsers, and emerging cloud-based channels in enterprises.
...
News
Cybersecurity incidents cost organizations $1,197 per employee, per year
Cybersecurity is an expensive business. To prepare to address sophisticated threat actors, an enterprise needs to maintain a complete security operations center (SOC) filled with state-of-the-art technologies and experienced professionals...
Page
Malware detection lp
Attack Vectors Malware Detection Malware (short for “malicious software”) detection includes various types of threats: viruses, ransomware, spyware, worms, trojans, keyloggers, and many more. The most common ways for malware...
Page
Cloud Storage lp
Cloud Storage Security 81% of security leaders believe cloud storage apps are vulnerable to attack Perception Point’s Advanced Cloud Storage Security Solution is the ONLY cloud storage security solution...
Page
Email Security
Email Security 91% of all cyber attacks start with an email. Perception Point’s Advanced Email Security Solution is a next-gen email security software that prevents APTs, phishing, malware, ATO,...
Page
Web security lp
Browser Security Perception Point’s Advanced Browser Security solution transforms the security of your native browsers, isolating, detecting and remediating all malicious threats from the web. It also protects access...
News
The Limitations of Traditional Cybersecurity Solutions
As enterprises continue to be targeted by increasingly sophisticated threat actors, it is vital that they assess the efficacy of their legacy cybersecurity solutions and adapt to the burgeoning threat landscape accordingly....
Attack Trends
New Phone Scams Evade Most Email Security Solutions
In this blog we discuss how phone scams have evolved, appearing more legitimate and evading detection engines of many email security vendors....
Page
Advanced Security for Microsoft 365
Advanced Security for Microsoft 365 All-Around Defense for the Microsoft-empowered organization. Whether it is Exchange Online, collaboration apps like OneDrive or SharePoint, enterprise communication via Microsoft Teams, or the Azure...
News
Like a Moth to a Flame: Why the Browser Is Such a Tempting Target
What exactly should enterprises be looking for in their security solutions to ensure their workers and assets stay safe from browser-based threats?...
Attack Trends
Beware: 4 Advanced Attack Examples You Should Know About
In this post we cover four advanced attack examples you should look out for. ...
Blog
Behind Perception Point’s SE Labs Triple-A Award
How Perception Point became the top provider in SE Labs’ Enterprise 2022 Q2 test for Email Security Services....
Page
Perception Point’s Cyber Threat Detection Technology
Next-Gen Cyber Threat Detection Technology Protect your organization with unprecedented advanced threat detection across email, web browsers, and cloud collaboration apps. One Detection Platform for Any Cyber Threat Protect against...
Attack Trends
Doenerium: It’s Not a Crime to Steal From Thieves
In this blog we review a sophisticated phishing campaign that uses the Doenerium malware to execute its payload. ...
Press
SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors
The integration consolidates, simplifies, and boosts advanced threat prevention and incident response across the organization’s endpoints, emails and cloud collaboration channels....
News
SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors
The integration consolidates, simplifies, and boosts advanced threat prevention and incident response across the organization's endpoints, emails and cloud collaboration channels...
Industry Insights
Karen Krivaa, Perception Point Shares How Organizations Can Combat Evolving Email Threats
Perception Point was recently named Best Email Security Solution by The Tech Ascension Awards....
News
Karen Krivaa, Perception Point Shares How Organizations Can Combat Evolving Email Threats
We spoke with Karen Krivaa, Perception Point about the email security challenges organizations are facing, how cloud has changed risk posture, and what organizations can do to ensure their email...
Attack Trends
Has Your Account Been Taken Over?
In this blog post we discuss how account takeover (ATO) attacks occur and what you should look out for to spot them....
News
Advanced Browser Security- Perception Point
Perception Point's Advanced Browser Security allows users to browse natively with no significant latency. It is compatible with all web browsers and all common browsers, and provides best-of-breed isolation for...
News
Black Hat Trip 2022 – Perception Point
Perception Point can isolate, detect, and remediate all attacks across both email, collaboration channels, and web browsers. ...
Page
Home Latest
Prevention Starts with Perception. Next-gen advanced email, web browser, and cloud apps security. ONE platform. ALL threats. Lightning fast. Zero overhead. Get Free Trial Selected Customers Prevention-based Security Across Your...
Press
Perception Point a Finalist in the 2022 SaaS Awards
Perception Point named finalist in International Software Awards Program, 2022 SaaS Awards....
Attack Trends
Behind the Attack: Remcos RAT
In this blog post, we break down the attack chain of a recent Remcos RAT malware campaign....
Press
Perception Point Recognized as the Best Email Security Solution by the 2022 Tech Ascension Awards
Perception Point has been recognized as the Best Email Security Solution by the 2022 Tech Ascension Awards....
Industry Insights
Browser Security: Threats, Solutions, and User Education
What are the top browser security threats, and how can you prevent them? Find out how security leaders can protect their organizations, here....
News
The One-Two Punch of Cybersecurity Solutions
Perception Point – a prevention-as-a-service company – recently launched their Web Security Solution, staking their stance on the resolution. ...
News
Perception Point Launches Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats
Managed solution lets users browse the web or access SaaS applications without exposing enterprise data to risk; providing highly advanced security for native browsers, while ensuring user productivity....
News
Perception Point launches Advanced Browser Security for eliminating web browser threats
Perception Point, a leading provider of advanced threat prevention across digital channels, released Perception Point Advanced Browser Security which is a new web security solution that adds enterprise-grade security to native Chrome and...
News
Perception Point Launches Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats
Perception Point, a leading provider of advanced threat prevention across digital channels, announced the release of Perception Point Advanced Browser Security, a new web security solution which adds enterprise-grade security to...
News
Perception Point Introduces Advanced Browser Security, a Transformative Web Security Solution to Eliminate Web Browser Threats
Perception Point, a leading provider of advanced threat prevention across digital channels, announced today the release of Perception Point Advanced Browser Security, a new web security solution which adds enterprise-grade security to...
Page
Free Advanced Browser Security
Free Advanced Browser Security Securely access any risky website or document in an instantly-deployed secure browser Automatically open risky or uncategorized websites in a secure browser Explicitly open any suspicious...
News
Perception Point launches managed security service to help eliminate web browser threats
Prevention-as-a-service vendor says its new managed security service lets users browse the web or access SaaS applications without exposing enterprise data to risk.
...
News
New Perception Point solution adds enterprise security to Chrome and Edge
Email and collaboration security startup Perception Point Inc. has released a new web security solution that adds enterprise-grade security to native Chrome and Edge browsers....