THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Up Next: ATOs Takeover Universities

As an increasing number of universities are hit by account takeover attacks, it seems the educational sector may be the next trending target for cyber attackers.

Behind the Attack: Ransomware

Have you ever wondered about the intricacies of a ransomware attack? In this post we detail what goes on before, during, and after a ransomware campaign.

What is Spear Phishing?

Learn how spear phishing tricks users into providing confidential information and ways to protect yourself against it.

What is Trap Phishing?

Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap phishing, which is becoming increasingly more common these days.
Phishing Attack Examples to Watch Out For | Perception Point

Cyber Scams Know No Bounds

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email security solution prevented, which were then analyzed by the IR team.

What is Business Email Compromise?

Business Email Compromise, also known as BEC for short, is a type of cybersecurity threat that involves cyber attackers impersonating company owners or executives to trick employees into transferring large sums of money or revealing confidential data.

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.
laptop and code cve-2020-9971

What is Barrel Phishing?

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. 

TALK TO SALES

Ready to Try
Perception Point?