NEW GARTNER REPORT — SECURING HYBRID WORK: ADOPTING THE RIGHT WORKSPACE SECURITY STRATEGY!  READ THE REPORT HERE

Blog.

Keep up with the latest attack trends, research, and cybersecurity industry updates on the Perception Point blog! 

blog img
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

walking people malicious activity

Incident Report: CV or Cyber Vector?

In this post we discuss how a cyber attack involving malicious macro code was disguised as a CV delivered via email.
tree root rca report

CVE-2019-0539 Root Cause Analysis

Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
paper stack phishing mail

Incident Report: Fax Attack

Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.
edge of building cve-2017-0199

CVE-2017-0199 (Still) In The Wild

Learn how Perception Point’s advanced threat detection platform caught an advanced attack (CVE-2017-0199) delivered via a malicious document.
beach phishing technique

Incident Report: Trick or Treat

In this post we discuss a phishing technique that tricks users into thinking an image of the attached file can be opened in snapshot mode.

Incident Report: Hijacked Email Account

In this post we discuss how the main aspect of hijacking is using a legitimate user’s email account in order to deliver malware.

Incident Report: Excel Macro Puzzle Attack

We discuss how attackers use a legitimate user’s email account and macro code to deliver malware as the response to an existing email thread.