Get Your Free Plan.

& Insights.

Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise. Equip yourself with an academic-level understanding of next‑gen cyber attacks.

Email Security Solutions

Top Flaws in Typical Email Security Solutions

Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security solution in place.
Security Awareness Training

Employee Security Training
Proven Not Enough

Train the machine—not just the employee. Hackers know that many companies rely on security employee training alone, so they’ve been upping their game to trick…
Default Email Security

Default Email Security Not Secure Enough

The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients have expressed dissatisfaction with default email security solutions, specifically citing Office 365.

BYOB (Build Your Own Botnet) in action.

Perception Point’s platform recently intercepted an attack leveraging the BYOB framework. We believe this is the first time the BYOB framework is seen being used for…

Mac Isn’t Safe.
How Do You Like Them Apples?

Apple's security measures aren't enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers.

User Experience vs. Cyber Security

There's a tension between security and business enablement. There's also a tension between security and user experience. So what can you do about it? A full article on the dos and don't's on user experience in cybersecurity
multifloor building secure cloud storage

Cloud Storage Security Risks

The security risks of cloud storage apps like Dropbox, OneDrive, Box, Google Drive, and why they need to be part of your security strategy.

What is a Zero Day Attack?

A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.
edge of building cve-2017-0199

CVE-2017-0199 (still) in the wild.

Perception Point’s platform recently caught an advanced attack directed at one of our Financial Services customers delivered via a malicious MS Word document. Our analysis…
black and white chain advanced threat protection

CVE-2015-5122: Exploitation using COOP.

Introduction. CFI has most certainly set the standard for exploit mitigations, and has inspired many implementations such as Microsoft CFG, Microsoft RFG, PaX Team’s RAP™ and Clang’s CFI. In this…
reptile embedded url

Phishing links moving to email attachments.

Our last attack trend blog focused on n-days and zero-days. However, this time I will discuss an evolved “everyday” attack we’ve seen recently – phishing links inside files.…
construction with plants software exploitation

Hardware vs. Software-based detection.

As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This…


Ready to Try
Perception Point?