THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Blog.

Keep up with Perception Point’s updates and new offerings. Follow us to see how we evolve to better protect you in our journey to lead the security domain.
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

face masks bec scams

BEC Scams: Mimecast Spoofing

Learn about a BEC scam comprised of two layers: spoofing a user’s email address and a phishing attempt to get Office 365 log-in credentials.
sharks g suite account

Campaign Alert: G Suite Phishing

Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage.
guy with mask attack vectors

Incident Report: A Combined Attack

Learn how we intercepted an email thread that combined popular attack vectors: impersonation, encrypted archive, and a malicious macro.

Statement of Account Email Attack

Learn about the widespread attack in which users first receive an email from an external source requesting an updated Statement of Account.
old phones phishing site

Campaign Alert: Call Me ASAP

Learn how attackers take an email address and insert it into the account name so users believes the site is legitimate in a recent campaign.
walking people malicious activity

Incident Report: CV or Cyber Vector?

In this post we discuss how a cyber attack involving malicious macro code was disguised as a CV delivered via email.
tree root rca report

CVE-2019-0539 Root Cause Analysis

Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
paper stack phishing mail

Incident Report: Fax Attack

Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.