Join our upcoming webinar! Up in the Cloud: The New Threat Landscape for Email, Browsers & Cloud Channels.

& Insights.

Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

BYOB (Build Your Own Botnet) in action.

Attacks leveraging the BYOB framework for fraudulent activity in the wild has been around for a few years now. We believe that the cyber security…
Security Awareness Training

Employee Security Training
Proven Not Enough

Train the machine—not just the employee. Hackers know that many companies rely on security employee training alone, so they’ve been upping their game to trick…

Mac Isn’t Safe.
How Do You Like Them Apples?

Apple's security measures aren't enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers.

What is a Zero Day Attack?

A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.
tree root rca report

CVE-2019-0539 Root Cause Analysis

Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
edge of building cve-2017-0199

CVE-2017-0199 (Still) In The Wild

Learn how Perception Point’s advanced threat detection platform caught an advanced attack (CVE-2017-0199) delivered via a malicious document.
construction with plants software exploitation

Hardware vs. Software-based Detection

As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This…


Ready to Try
Perception Point?