Detection Technology

AI-Enhanced Threats

In an era where 91.1% of organizations have already faced AI-enhanced phishing and BEC attacks, the call for advanced, AI-powered cyber defenses has never been louder.

With traditional security measures falling short against malicious actors leveraging AI tools to craft sophisticated attacks on email, browser and SaaS apps – the solution is clear:

“An AI for an AI” is needed.

graphic of squares
multi layer platform bec

Putting the AI in EMAIL SECURITY

nlp models

Natural Language Processing & GenAI Models

Developed to UNDERSTAND your organization’s unique relationships and communication patterns. These technologies go beyond mere algorithms to offer a more nuanced and effective detection of social engineering based attacks. 

  • Supply-Chain Recognition​​: This feature analyzes business communication to automatically identify domains of your organization’s business partners, vendors, and more.
  • Thread Hijack Protection: An anti-spoofing correlation algorithm prevents conversation hijacking and vendor impersonation attempts, adding an extra layer of security to business communications.

Image Recognition Algorithms

Designed to SEE through advanced phishing attacks and brand spoofing attempts. These algorithms are not just about identifying images; they’re about understanding the context in which they appear, offering a robust defense against visual-based threats.

  • Two-Step Phishing​: This proprietary object detection model examines webpages to recognize clickable elements for further scanning, protecting against hidden malicious payloads. 
  • Brand Recognition​​​: Compares email, URL, file screenshots, images, and URL favicons to known brand assets to detect spoofing. Data is analyzed against both known ‘clean’ and ‘malicious’ images.
  • Quishing Protection: Utilizing real-time image recognition, this feature scans QR codes embedded in emails or attachments. A proprietary anti-evasion algorithm follows the URLs to dynamically scan them for phishing or malware delivery attempts.
Behavioral and Content-Based Analysis

Behavioral and Content-Based Analysis

Crafted to RECOGNIZE anomalies, malicious sentiments, and evasion techniques. This isn’t just about flagging suspicious activities; it’s about understanding the underlying behaviors that drive them, offering a more comprehensive security net.

  • Anomaly Detection​: Identifies changes in sender’s tone and sentiment, analyzes message content, and compares metadata to find deviations. Topic modeling for subject and email body adds another layer of security.
  • Content Analysis​: LLM-based models extract sensitive content like personally identifiable information (PII), identify names of entities (NER), and analyze textual metadata.
  • Textual-Obfuscation Detection: Detects evasion attempts that conceal malicious text by replacing certain characters with other visually similar ones, invisible ones, etc.

Powered by AI. Empowered by People.

The future of cybersecurity isn’t just machine-driven; it’s user-focused. Some say AI is only as good as the data it was trained on. At Perception Point we add human insight to the equation. Our team of security experts are the unsung heroes behind our AI prowess. 

The 24/7 Managed Incident Response Service is ensuring that the technology is not just powered by AI and quality data, but truly empowered by human expertise and insight. 

Our “woman/man in the machine” team is in charge of fine-tuning detection algorithms, crafting machine learning policies in real-time, optimizing AI-based decisions, and hunting down false positives – so you don’t have to.


Ready to Try
Perception Point?

Learn More