Perception Point Acquires Hysolate


Keep up with Perception Point’s updates and new offerings. Follow us to see how we evolve to better protect you in our journey to lead the security domain.

Crypto-related phishing and how to avoid it

In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency industry.

Perception Point Acquires Hysolate

Perception Point announced that it has acquired Hysolate, a next-gen web isolation platform operating at the endpoint level, to deliver unprecedented protection against all content-based attacks by leveraging three necessary layers of cybersecurity technology: isolation, detection, and remediation.

Perception Point Acquires Web Security Startup Hysolate

‘Once we were introduced to the opportunity, we had no hesitation because of the quality of the technology, the experience of the team, and the product that they built,’ says Perception Point CEO Yoram Salinger.

What is Trap Phishing?

Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap phishing, which is becoming increasingly more common these days.
Phishing Attack Examples to Watch Out For | Perception Point

Cyber Scams Know No Bounds

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email security solution prevented, which were then analyzed by the IR team.

What is Cyber Threat Intelligence?

Cyber Threat Intelligence (CTI) is, in essence, data that has been analyzed and validated through multiple analysis processes specific to cybersecurity.

What is Business Email Compromise?

Business Email Compromise, also known as BEC for short, is a type of cybersecurity threat that involves cyber attackers impersonating company owners or executives to trick employees into transferring large sums of money or revealing confidential data.

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.
laptop and code cve-2020-9971

What is Barrel Phishing?

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. 
hands on a laptop with clone phishing

What is Clone Phishing?

Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to prevent it from reaching your inbox and your organization.
beware of malware

How to Prevent Malware Attacks

Malware, or malicious software, is software designed to take charge or disrupt its victim’s computer or network infrastructure. In this blog, we’ll explain the challenges in detecting malware and how to prevent malware attacks with best practices and advanced technologies.

Successor to ‘Shrootless’ Bug Attacks Mac SIP Feature

Researchers at Perception Point write about CVE-2022-22583, a successor to Shrootless that could let attackers bypass Mac System Integrity Protection (SIP). It was patched yesterday in macOS Monterey 12.2, macOS Big Sur 11.6.3 and Security Update 2022-001 Catalina. Apple shared the credit for this CVE between three researchers: Mickey Jin, Ron Hass of Perception Point and an anonymous researcher.
ransomware attack on a computer

How to Prevent Ransomware Attacks

Ransomware, an advanced form of cyberattack, is one of the biggest threats that security teams around the world are facing. All organizations have become a target, from small teams to large enterprises, state systems and government networks. 

Characteristics of Best Email Security Solutions

Many enterprises are suffering from a growing number of severe cyberattacks, where the majority of them - over 90% - originate from a malicious email and actually could have been prevented by a next-gen advanced email security solution with the right features and necessary level of protection. As a CISO or security leader, you are probably asking yourself, what are the characteristics of the top-notch email security solutions in the market? What should you look for, when evaluating an email security solution?
Default Email Security

SEGs vs. ICES Solutions: The Complete Guide

Find out everything there is to know about Gartner’s two email security solution categories, SEGs (Secured Email Gateways) and ICES (Integrated Cloud Email Security), including their benefits, differences, and how each is deployed.

‘Tis the Season…for Cyberattacks!

Unlike the rest of us, cyber attackers don’t take vacations. The holiday season is upon us, and many are preparing to celebrate with family and friends both near and far. For attackers, the holiday season is a perfect time to launch attacks, when businesses are closed or are operating with a skeletal crew.

Cyberattacks Are Becoming More Sophisticated

According to Perception Point CEO, Yoram Salinger, we will see cyberattacks becoming more sophisticated than they already are in the upcoming year. In this article we review why most enterprises are still susceptible to cyberattacks and what CISOs should take into consideration in 2022.

Techniques Used by Hackers to Bypass Email Security Solutions

There are many email security solutions available in the market today, yet organizations still see phishing and malware reach users. Here is a list of the most-used techniques that hackers choose to bypass traditional email security solutions.
5 takeaways from Gartner 2021 Market Guide for Email Security

5 Key Takeaways from the 2021 Gartner Market Guide for Email Security

In this blog post, we cover the main takeaways from the 2021 Market Guide for Email Security Report by Gartner, and how security leaders can make an impact on their organization's security posture by taking a deeper look at their email security provider.

Phony Job Ads and How to Spot Them

Job ad scams are on the rise. According to the FBI, more than 16,000 Americans reported employment scams in 2020. Some are easy to spot. Others are quite sophisticated.
email symbols connected by lines

The (Yet) Unsolved Problem of Email Security

The number of cyberattacks is dramatically on the rise, the majority originating via email. Unfortunately many security leaders have just accepted this reality as fact. This blog discusses how you can evaluate whether you have the right email security solution to get the job done.

Virtual Event: How did the bad guys get in? Attack vectors in the modern enterprise

Have you ever wondered how you were hacked? In this meetup, Perception Point will discuss the latest attack vectors that cybercriminals are employing to breach organizations. We will cover various techniques used through the email channel, cloud collaboration channels including Box, Dropbox, OneDrive, and Google Drive and perimeter breaches - diving into the attack kill chains.

Salesforce Email Service Used for Phishing Campaign

Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats to corporate networks that can come from whitelisted email addresses.
Dana Roth

Phisher Errors Lower Entry Barriers for Wanna-be Phishers

Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ a phishing scheme – without knowing any programming, going to the darknet or paying a thing.

Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we're bringing PREVENTION is back.
white strip building apn partners

AWS Selects Perception Point as a Technology Partner.

Perception Point, a leading provider of advanced threat protection for Email and Shared Drive services, has been recognised as a Select Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).


Ready to Try
Perception Point?