THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Attack Trends.

Stay ahead of the “attack waves” with in-depth analysis of key incidents and understand what’s trending among today’s malicious actors.

  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

face masks bec scams

BEC Scams: Mimecast Spoofing

Learn about a BEC scam comprised of two layers: spoofing a user’s email address and a phishing attempt to get Office 365 log-in credentials.
sharks g suite account

Campaign Alert: G Suite Phishing

Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage.
guy with mask attack vectors

Incident Report: A Combined Attack

Learn how we intercepted an email thread that combined popular attack vectors: impersonation, encrypted archive, and a malicious macro.

Statement of Account Email Attack

Learn about the widespread attack in which users first receive an email from an external source requesting an updated Statement of Account.
old phones phishing site

Campaign Alert: Call Me ASAP

Learn how attackers take an email address and insert it into the account name so users believes the site is legitimate in a recent campaign.
walking people malicious activity

Incident Report: CV or Cyber Vector?

In this post we discuss how a cyber attack involving malicious macro code was disguised as a CV delivered via email.
paper stack phishing mail

Incident Report: Fax Attack

Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.
beach phishing technique

Incident Report: Trick or Treat

In this post we discuss a phishing technique that tricks users into thinking an image of the attached file can be opened in snapshot mode.

See Perception Point in action!

Fill out the form and get a personalized demo of Perception Point.  We’ll send you a link to book a demo with our sales reps within one (1) business day.