Research
& Insights.

Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise. Equip yourself with an academic-level understanding of next‑gen cyber attacks.

Cloud Storage Security Risks

The security risks of cloud storage apps like Dropbox, OneDrive, Box, Google Drive, and why they need to be part of your security strategy.

What is a Zero Day Attack?

A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.

BYOB (Build Your Own Botnet) in action.

What is BYOB (Build Your Own Botnet)? In today’s cyber security world, the gap between the expertise required to carry out a high quality attack…

CVE-2017-0199 (still) in the wild.

Perception Point’s platform recently caught an advanced attack directed at one of our Financial Services customers delivered via a malicious MS Word document. Our analysis…

CVE-2015-5122: Exploitation using COOP.

Introduction. CFI has most certainly set the standard for exploit mitigations, and has inspired many implementations such as Microsoft CFG, Microsoft RFG, PaX Team’s RAP™ and Clang’s CFI. In this…

Phishing links moving to email attachments.

Our last attack trend blog focused on n-days and zero-days. However, this time I will discuss an evolved “everyday” attack we’ve seen recently – phishing links inside files.…

Hardware vs. Software-based detection.

As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This…

TALK TO SALES

Ready to Try
Perception Point?