A deep dive into the world of CRM-based attacks. Learn how Salesforce can be a threat to your organization
A Hop to Modern Email
Intro to the email world: how it works, description of its key components, and what are the key protocols associated with it.
Internal Email Security Risks
A deep dive into account takeover attacks and other internal email threats, and how to protect your organization.
Open Source: Democratizing Cyberattacks
How open resource resources enable even average attackers to become sophisticated ones.
Cloud vs. SaaS, and everything in between
IaaS, PaaS, SaaS and hosted appliances: Making sense of the cloud and what it offers
Spear Phishing 101
An overview of spear phishing: what it is, examples and how to prevent it.
What is a Zero Day Attack?
One of the most dangerous exploits in cyber security is a zero day attack. Learn what these are, why they are so dangerous, and how to prevent them.
Cloud Storage Security Risks
The security risks of cloud storage apps like Dropbox, OneDrive, Box, Google Drive, and why they need to be part of your security strategy.
A Look Inside Insider Threats
Learn what an insider threat is, and what they can look like. Do you think you’re at risk from an insider threat? Read more here.
The Art of Impersonation
Business Email Compromise (BEC) and email Account Compromise (EAC) attacks are sophisticated scams used by attackers employing social engineering techniques to make you believe you are interacting with a trusted sender.
Phishing. What? Where? When?
What is phishing exactly, how the technique works and how to prevent it.
Webinar: Securing Digital Transformation
How to close major loopholes in the digital-first enterprise.
Webinar: OneDrive, DropBox, Box..Your Weakest Security Link
Why shared drive services are sitting ducks for hackers, and how to close the gap.
Death of the Sandbox
How Sandboxes are being easily bypassed, and what’s next in advanced threat prevention technology.
When Google is a Fertile Ground for Phishing
See how attackers are leveraging Google Forms and its likes to phish your employees.
BEC Attack: Mimecast Spoofing
Overview of a recent attack technique spoofing a known email security vendor.
Phishing, BEC & Collaboration – in a single attack
Analysis of an attack combining phishing and BEC, while leveraging a collaboration tool.
Campaign Alert: G-Suite Phishing
Learn about a widespread email attack campaign targeting G Suite clients.
Campaign Alert: You (almost) have been compromised!
Modern trends in BEC attacks seen in the wild by Perception Point
Incident Report: A Combined Attack
Perception Point spotted an attack that combined numerous attack techniques
Incident Report: Statement of Account
Learn more about a widespread campaign tricking users into opening a fake statement of account.
Campaign Alert: Call me ASAP
Overview of a phishing attempt using an urgent call back request.
Incident Report: Composite Moniker
We’ve spotted CVE-2017-8570, a.k.a the “Composite Moniker” in the wild alive and kicking.
Incident Report: CV or Cyber Vector
Resume files can be dangerous, especially when they are encrypted word documents.
Incident Report: Trust Fibonacci
From uncovering a VBS backdoor that quotes the Fibonacci sequence to receiving “trust worthy” emails.
Incident Report: Fax Attack
Recently we detected an attempt to leverage a known service, EFax, which is often utilized by our client, to trick employees into clicking on a phishing link.
Incident Report: AP28 – Fancy Bear
APT28, a highly advanced attack also known as Fancy Bear, is associated with the Russian military intelligence agency GRU.
Incident Report: Trick or Treat
There is a rise in the usage of a phishing technique that tricks the user into thinking that an image of the attached file can be quickly opened in snapshot mode.
Incident Report: Hijacked Conversation
One of our customers received an email with a malicious document attached to an existing thread in order to seem like a legitimate email.
Incident Report: Excel Macro Puzzle Attack
Most attacks tend to be “plain vanilla” – a phishing link, a fake website, a malicious executable and so on. But sometimes attackers can be particularly creative in the design of their technique. Recently our platform exposed such an approach.
Incident Report: Fake password protected files
Analysis of how attackers leverage a fake login to trick the user into exposing his username and password.
Perception Point Recognized in Gartner’s 2019 Market Guide for Email Security
Read the Gartner 2019 Email Security guide and learn why Perception Point is the next generation line of threat detection.
Perception Point Integrates With Box
Perception Point integrates with Box, leading Cloud Content Management Platform, to enhance security and threat detection
AWS Selects Perception Point as a Technology Partner
Perception Point, a leading provider of advanced threat protection to Email and Shared Drive services, has been recognized as a Select Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).
The Most Popular “At-Work” Apps are Amongst the Most Vulnerable to Cyberattacks
New survey by Perception Point finds that 80% of IT decision makers believe the most popular “At-Work” apps are among the most vulnerable to cyberattacks
CVE-2019-0539 Root Cause Analysis
BYOB (Build Your Own Botnet) in action
Perception Point’s platform recently intercepted an attack leveraging the BYOB framework. This is the first time the BYOB framework is seen being used for fraudulent activity in the wild.
CVE-2017-0199 (still) in the wild
Our platform recently caught an advanced attack directed at one of our Financial Services customers delivered via a malicious MS Word document.
Changing memory protection in an arbitrary process
Our research team’s insights regarding changing the protection flags of memory regions in an arbitrary process.
CVE-2015-5122: Exploitation using COOP
Revisit an old exploit (CVE-2015-5122) and exploit it by using COOP
The Gödel Proof & the Malware-Detection Spoof
The logical flaw in software-only malware detection.
Phishing links moving to email attachments
Watch out for this evolved phishing technique we’ve identified.
Analysis and Exploitation of a Linux Kernel Vulnerability
Zero day vulnerability in Linux Kernel found by Perception Point research team.
Malicious MS Office attachments on the rise
How hackers can make variations within one campaign, as seen in a recent customer.
Download product data sheets and whitepapers.
Connect with our team to:
* Learn more
* Get a live demo
* Get a quote
* Set up a free 30 day trial
We will respond to your enquiry within 24 hours.