THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Blog.

Keep up with the latest attack trends, research, and cybersecurity industry updates on the Perception Point blog! 

blog img
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber security and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Behind the Attack: Ransomware

Have you ever wondered about the intricacies of a ransomware attack? In this post we detail what goes on before, during, and after a ransomware campaign.

Techniques Used in 3 Types of Phishing

Different types of phishing use different techniques to ensure a successful attack. Learn how to identify them and keep your business secure.

What is EAC?

EAC, short for Email Account Compromise, is a type of cybersecurity attack in which cyber attackers attempt to fully compromise a user’s email account and…