THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Qakbot Malware

Qakbot Malware: Insights Into an Excel 4.0 Macro Attack

In this campaign, the attacker conceals malicious payload by deeply embedding it within multiple types of content and using different evasion techniques. Perception Point's IR team found loopholes and was able to backtrack his steps to understand his techniques.
foundr magazine ceo fraud

‘CEO Fraud’ Phishing Kit on the Rise

The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages.
Slow email protection software

Slow Email Protection Software
Got You Down?

Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats.
Zoom cybersecurity

Zooming in on Zoom: Why is Zoom a Cybersecurity Risk?

Zoom is growing quickly, which is good and bad. Good because it makes it easy to work from home, and bad because it's a security risk. Once a log-in page is necessary (such as in Zoom)—a new loophole for stealing credentials is created.

New Wave of Malicious
Excel 4.0 Macros

Excel 4.0 macros have been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely on this legitimate functionality.
standing shadow account takeover protection

Account Takeover Protection: A Real-life Example of an Email Attack Trend

A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a “normal” email correspondence. This is great evidence for the ultimate social engineering attack, showing how attackers are ever evolving, and that everyone needs account takeover protection.

Top 4 Phishing Tricks to Look Out For

Stay up to date with the latest phishing trends and tricks. We now focus on 4 points that can surely help you be prepared for the next attack.

See Perception Point in action!

Fill out the form and get a personalized demo of Perception Point.  We’ll send you a link to book a demo with our sales reps within one (1) business day.