at their source.
Next gen email protection
100% threat visibility.
We stop email attacks at the earliest possible stage - pre-malware delivery - for faster, more accurate protection against zero day, n-day, and every day threats.
Full mobile site comming soon.
Learn more on our desktop site now.
The latest insights from our research team and happenings at Perception Point.
Breaking CFI: Exploiting CVE-2015-5122 using COOP
In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented.
Case Study: The evolution of a recent attack campaign
How hackers can make variations within one campaign - as seen in a recent customer attack we blocked.
Attack Trend: Phishing links moving to email attachments
Typically phishing links are sent directly inside the email body, but now attackers are embedding their phishing links inside an email attachment instead.
The Gödel proof & the malware-detection spoof
Cybersecurity solutions that detect malware only at the software layer are inherently flawed. This fact is based on a basic principle proven nearly 100 years ago.
Attack Trend: Malicious MS Office attachments on the rise
The form of the attack varies from ransomware to banking trojans, but the number of underlying techniques are limited.
Hardware vs. Software-based detection
A brief history of software exploitation and mitigation techniques, and how defensive technologies must be approached today.
Perception Point closes $8m series A round
Will use funding to launch US presence and expand product portfolio.
Analysis and Exploitation of a Linux Kernel Vulnerability (CVE-2016-0728)
We have identified a zero-day local privilege escalation vulnerability in the Linux kernel.