THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Blog.

Keep up with the latest attack trends, research, and cybersecurity industry updates on the Perception Point blog! 

blog img
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Phishing Attack Examples to Watch Out For | Perception Point

Examples of Cyber Attacks and How They Were Prevented

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email security solution prevented, which were then analyzed by the IR team.

BYOB (Build Your Own Botnet) in action.

Attacks leveraging the BYOB framework for fraudulent activity in the wild has been around for a few years now. We believe that the cyber security…

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.
laptop and code cve-2020-9971

What is Barrel Phishing & How to Prevent it

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. 
hands on a laptop with clone phishing

What is Clone Phishing?

Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to prevent it from reaching your inbox and your organization.
beware of malware

How to Prevent Malware Attacks

Malware, or malicious software, is software designed to take charge or disrupt its victim’s computer or network infrastructure. In this blog, we’ll explain the challenges in detecting malware and how to prevent malware attacks with best practices and advanced technologies.
ransomware attack on a computer

How to Prevent Ransomware Attacks

Ransomware, an advanced form of cyberattack, is one of the biggest threats that security teams around the world are facing. All organizations have become a target, from small teams to large enterprises, state systems and government networks.