Blog.

Keep up with Perception Point’s updates and new offerings. Follow us to see how we evolve to better protect you in our journey to lead the security domain.
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

What Goes “App” Could Take You Down

Files "are like a box of chocolates, you never know what you're going to get". In this blog, we cover the risks of malicious file uploads to web apps and the best practices to prevent them.

3 Key Takeaways from the 2023 Gartner® Market Guide for Email Security

As email continues to be the primary vector for cyber attacks, staying up to date with the latest developments in email security is essential. In this blog post, we examine key insights from the latest Market Guide for Email Security Report by Gartner, and offer practical recommendations on how security and risk management leaders can fortify their security posture in 2023.

One for the Show, Two for the Money

Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users' inboxes.

Takeaways from the CircleCI Incident

Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the attacker was able to potentially access and steal data from a subset of databases and stores.

Zendesk – Is It a One Way “Ticket” to Ransomland?

In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform.

The Rebranded Crypter: ScrubCrypt

In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware.

Beware: njRAT Malware Has Entered the Discord

In this blog post, we review a recent phishing campaign that leverages Discord CDN to host malicious files and lure unsuspecting users into becoming victims of the njRAT malware.