Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

What is Trap Phishing? 3 Stages of an Attack and Prevention Tips

Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap phishing, which is becoming increasingly more common these days.
Phishing Attack Examples to Watch Out For | Perception Point

Examples of Cyber Attacks and How They Were Prevented

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email security solution prevented, which were then analyzed by the IR team.

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.
laptop and code cve-2020-9971

What is Barrel Phishing & How to Prevent it

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. 
hands on a laptop with clone phishing

What is Clone Phishing?

Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to prevent it from reaching your inbox and your organization.

See Perception Point in action!

Fill out the form and get a personalized demo of Perception Point.  We’ll send you a link to book a demo with our sales reps within one (1) business day.