Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise. Equip yourself with an academic-level understanding of next‑gen cyber attacks.
In this blog, our researchers demonstrate how they were able to weaponize a Word document with a published macOS/iOS privilege escalation exploit, lift the app sandbox restrictions and gain higher privileges.
Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security solution in place.
The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients have expressed dissatisfaction with default email security solutions, specifically citing Office 365.
A detailed, to-the-point analysis of the most phished brands in email attacks and the importance of asset-based protection as c. 50% of attacks are actually related to the targeted company and its stakeholders.
There's a tension between security and business enablement. There's also a tension between security and user experience. So what can you do about it? A full article on the dos and don't's on user experience in cybersecurity
A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.