Incident Reports.

read more
May 27, 2019

Campaign Alert: You (almost) have been compromised!

Modern trends in BEC attacks seen in the wild by Perception Point

Perception Point Incident Response

May 27, 2019
read more
May 13, 2019

Incident Report: A Combined Attack

Perception Point spotted an attack that combined numerous attack techniques

Perception Point Incident Response

May 13, 2019
read more
May 8, 2019

Incident Report: Statement of Account

Learn more about a widespread campaign tricking users into opening a fake statement of account.

Perception Point Incident Response

May 8, 2019
read more
May 5, 2019

Campaign Alert: Call me ASAP

Overview of a phishing attempt using an urgent call back request.

Perception Point Incident Response

May 5, 2019
read more
February 28, 2019

Incident Report: Composite Moniker

We’ve spotted CVE-2017-8570, a.k.a the “Composite Moniker” in the wild alive and kicking.

Perception Point Incident Response Team

February 28, 2019
read more
February 21, 2019

Incident Report: CV or Cyber Vector

Resume files can be dangerous, especially when they are encrypted word documents.

Perception Point Incident Response Team

February 21, 2019
read more
January 31, 2019

Incident Report: Trust Fibonacci

From uncovering a VBS backdoor that quotes the Fibonacci sequence to receiving “trust worthy” emails.

Perception Point Incident Response Team

January 31, 2019
read more
January 21, 2019

Incident Report: Fax Attack

Recently we detected an attempt to leverage a known service, EFax, which is often utilized by our client, to trick employees into clicking on a phishing link.

Perception Point Incident Response Team

January 21, 2019
read more
January 15, 2019

Incident Report: #28

APT28, a highly advanced attack also known as Fancy Bear, is associated with the Russian military intelligence agency GRU.

Perception Point Incident Response Team

January 15, 2019
read more
December 4, 2018

Incident Report: Trick or Treat

There is a rise in the usage of a phishing technique that tricks the user into thinking that an image of the attached file can be quickly opened in snapshot mode.

Perception Point Incident Response Team

December 4, 2018
read more
November 24, 2018

Incident Report: Hijacked Conversation

One of our customers received an email with a malicious document attached to an existing thread in order to seem like a legitimate email.

Perception Point Incident Response Team

November 24, 2018
read more
October 23, 2018

Incident Report: Excel Macro Puzzle Attack

Most attacks tend to be “plain vanilla” – a phishing link, a fake website, a malicious executable and so on. But sometimes attackers can be particularly creative in the design of their technique. Recently our platform exposed such an approach.

Perception Point Incident Response Team

October 23, 2018
read more
October 16, 2018

Incident Report: Fake password protected files

Analysis of how attackers leverage a fake login to trick the user into exposing his username and password.

By Michael Aminov, Founder & Chief Architect

October 16, 2018
read more
July 2, 2018

Incident Report: Malicious Macro

Analysis of an APT attack we recently intercepted for a customer, pre-breach.

Perception Point Incident Response Team

July 2, 2018

Research.

read more
March 5, 2019

CVE-2019-0539 Exploitation

Achieving full R\W primitive with CVE-2019-0539

Rom Cyncynatus and Shlomi Levin

March 5, 2019
read more
February 13, 2019

CVE-2019-0539 Root Cause Analysis

A dive into the root cause analysis of CVE-2019-0539 in Chakra javascript engine

Rom Cyncynatus and Shlomi Levin

February 13, 2019
read more
January 16, 2019

BYOB (Build Your Own Botnet) in action

Perception Point’s platform recently intercepted an attack leveraging the BYOB framework. This is the first time the BYOB framework is seen being used for fraudulent activity in the wild.

Perception Point Incident Response Team

January 16, 2019
read more
December 26, 2018

CVE-2017-0199 (still) in the wild

Our platform recently caught an advanced attack directed at one of our Financial Services customers delivered via a malicious MS Word document.

Perception Point Incident Response Team

December 26, 2018
read more
November 28, 2018

Changing memory protection in an arbitrary process

Our research team’s insights regarding changing the protection flags of memory regions in an arbitrary process.

By Ron Hass & Mike Bazov

November 28, 2018
read more
June 4, 2018

CVE-2015-5122: Exploitation using COOP

Revisit an old exploit (CVE-2015-5122) and exploit it by using COOP

Oshri Sela and Shlomi Levin

June 4, 2018
read more
March 20, 2018

The Gödel Proof & the Malware-Detection Spoof

The logical flaw in software-only malware detection.

By Shlomi Levin, Founder & CTO

March 20, 2018
read more
March 19, 2018

Phishing links moving to email attachments

Watch out for this evolved phishing technique we’ve identified.

By Michael Aminov, Founder & Chief Architect

March 19, 2018
read more
March 7, 2018

Analysis and Exploitation of a Linux Kernel Vulnerability

Zero day vulnerability in Linux Kernel found by Perception Point research team.

Perception Point Research Team

March 7, 2018
read more
February 28, 2018

Malicious MS Office attachments on the rise

How hackers can make variations within one campaign, as seen in a recent customer.

By Michael Aminov, Founder & Chief Architect

February 28, 2018
read more
February 22, 2018

Hardware vs. Software-based detection

A brief history of software exploitation and mitigation techniques, and how defensive technologies must be approached today.

Shlomi Levin, Founder & CTO

February 22, 2018

Materials.

Download product data sheets and whitepapers.

WHITE PAPER

BEC Whitepaper

Overview of BEC Techniques and how to prevent them.

download
PDF

DATA SHEET

FireEye Comparision

COMPARISON OF PERCEPTION POINT VS. FIREEYE EMAIL SECURITY.

download
PDF

CASE STUDY

Securing G Suite

CASE STUDY OF SECURING A CLIENT USING GMAIL AND FIREEYE.

download
PDF

DATA SHEET

Barracuda Comparison

CASE STUDY OF PERCEPTION POINT VS. BARRACUDA IN LIVE TESTING. COMPLETE EMAIL SECURITY FEATURES COMPARISON.

download
PDF

CASE STUDY

Securing Office 365

Case study of securing a client who previously only used Microsoft ATP.

download
PDF

DATA SHEET

Advanced Cloud Storage Security

Cloud Storage security data sheet.

download
PDF

DATA SHEET

Advanced Email Security

Email security data sheet.

download
PDF

CASE STUDY

Proofpoint Comparison

Case study of Perception Point vs. Proofpoint in live testing. Complete Email Security features comparison.

download
PDF

CASE STUDY

Mimecast Comparison

Case study of Perception Point vs. Mimecast in live testing. Complete Email Security features comparison.

download
PDF

DATA SHEET

Advanced Collaboration Security

Advanced Collaboration Security data sheet with overview of the full solution and technology.

download
PDF

DATA SHEET

Leading Solutions Comparison

Comparison of Perception Point's Email security and APT capabilities vs. major brands.

download
PDF

Try Our
Solution Out

Connect with our team to:
* Learn more
* Get a live demo
* Get a quote
* Set up a free 30 day trial

We will respond to your enquiry within 24 hours.

sales@perception-point.io


Link has been copied to your clipboard!