Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Takeaways from the CircleCI Incident

Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the attacker was able to potentially access and steal data from a subset of databases and stores.

The Rebranded Crypter: ScrubCrypt

In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware.

Beware: njRAT Malware Has Entered the Discord

In this blog post, we review a recent phishing campaign that leverages Discord CDN to host malicious files and lure unsuspecting users into becoming victims of the njRAT malware.

Has Your Account Been Taken Over?

In this blog post we discuss how account takeover (ATO) attacks occur and what you should look out for to spot them.

Behind the Attack: XML or HTML?

A new cyberattack disguises HTML phishing sites as XML files, allowing attackers to bypass and evade most detection platforms.


Ready to Try
Perception Point?