Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

lumma malware featured image

Behind the Attack: LUMMA Malware

In this interesting InfoStealer attack, a threat actor leverages a multi-layered fake invoice campaign to distribute LUMMA malware. 

How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing so easy, even for the inexperienced.

Operation Red Deer

Outing Aggah's Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel

TALK TO SALES

Ready to Try
Perception Point?