fbpx

Join our upcoming webinar! Up in the Cloud: The New Threat Landscape for Email, Browsers & Cloud Channels.

News.

Keep up with Perception Point’s updates and new offerings. Follow us to see how we evolve to better protect you in our journey to lead the security domain.

Cyberattack cost examined

Combating cyberattacks has proven to be costly, with organizations shelling out $1,197 per employee annually to deal with email service-, cloud app- or service-, and web browser-related cyber incidents, excluding expenses related to compliance fines, mitigation costs, and business losses, VentureBeat reports.

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous significant findings about today’s enterprise threat landscape.

Enterprises spend $1,197 per employee annually to address increasingly sophisticated and successful cyber-attacks

Perception Point, a leading provider of advanced threat prevention across digital channels, today announced the publication of a new report, ‘The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels’. The report, based on a survey conducted in conjunction with Osterman Research, evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous significant findings about today’s enterprise threat landscape.

Cybersecurity incidents cost organizations $1,197 per employee, per year

Cybersecurity is an expensive business. To prepare to address sophisticated threat actors, an enterprise needs to maintain a complete security operations center (SOC) filled with state-of-the-art technologies and experienced professionals who know how to identify and mitigate threats. 

The Limitations of Traditional Cybersecurity Solutions

As enterprises continue to be targeted by increasingly sophisticated threat actors, it is vital that they assess the efficacy of their legacy cybersecurity solutions and adapt to the burgeoning threat landscape accordingly.

SentinelOne and Perception Point Partner

Perception Point, a provider of advanced threat protection across digital channels, announced that it has partnered with SentinelOne to provide customers unparalleled advanced threat detection and rapid remediation across enterprise endpoints, email, and cloud collaboration channels.

SentinelOne and Perception Point Partner for Unparalleled Advanced Threat Protection and Rapid Remediation Across Principal Attack Vectors

Perception Point, a leading provider of advanced threat protection across digital channels, announced that it has partnered with SentinelOne, an autonomous cybersecurity platform company, to provide customers unparalleled advanced threat detection and rapid remediation across enterprise endpoints, email, and cloud collaboration channels.

Advanced Browser Security- Perception Point

Perception Point's Advanced Browser Security allows users to browse natively with no significant latency. It is compatible with all web browsers and all common browsers, and provides best-of-breed isolation for high-risk sites.

Perception Point Makes Securing Browsers Simpler

Perception Point this week launched an alternative approach to creating sandboxes on Chrome and Microsoft Edge browsers that isolates browser sessions from potential web threats.

Crypto-related phishing and how to avoid it

In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency industry.

Utilizing biological algorithms to detect cyber attacks

Phishing, a longstanding cyberattack technique through which attackers impersonate others to gain access to confidential information, has become immensely popular as of late, hitting an all-time high in December 2021, with attacks tripling since the previous year.

Perception Point Acquires Hysolate

Perception Point announced that it has acquired Hysolate, a next-gen web isolation platform operating at the endpoint level, to deliver unprecedented protection against all content-based attacks by leveraging three necessary layers of cybersecurity technology: isolation, detection, and remediation.

Perception Point Acquires Web Security Startup Hysolate

‘Once we were introduced to the opportunity, we had no hesitation because of the quality of the technology, the experience of the team, and the product that they built,’ says Perception Point CEO Yoram Salinger.

The pandemic made way for innovation but also a larger attack surface

Cybernews interview with Karen Krivaa, CMO at Perception Point: While hackers have always been lurking around in one way or another, the ongoing pandemic and adaptation to remote roles paved the way for cyber felons to further increase attacks on enterprises.

Successor to ‘Shrootless’ Bug Attacks Mac SIP Feature

Researchers at Perception Point write about CVE-2022-22583, a successor to Shrootless that could let attackers bypass Mac System Integrity Protection (SIP). It was patched yesterday in macOS Monterey 12.2, macOS Big Sur 11.6.3 and Security Update 2022-001 Catalina. Apple shared the credit for this CVE between three researchers: Mickey Jin, Ron Hass of Perception Point and an anonymous researcher.

‘Tis the Season…for Cyberattacks!

Unlike the rest of us, cyber attackers don’t take vacations. The holiday season is upon us, and many are preparing to celebrate with family and friends both near and far. For attackers, the holiday season is a perfect time to launch attacks, when businesses are closed or are operating with a skeletal crew.

Cyberattacks Are Becoming More Sophisticated

According to Perception Point CEO, Yoram Salinger, we will see cyberattacks becoming more sophisticated than they already are in the upcoming year. In this article we review why most enterprises are still susceptible to cyberattacks and what CISOs should take into consideration in 2022.

Techniques Used by Hackers to Bypass Email Security Solutions

There are many email security solutions available in the market today, yet organizations still see phishing and malware reach users. Here is a list of the most-used techniques that hackers choose to bypass traditional email security solutions.

Phony Job Ads and How to Spot Them

Job ad scams are on the rise. According to the FBI, more than 16,000 Americans reported employment scams in 2020. Some are easy to spot. Others are quite sophisticated.

Salesforce Email Service Used for Phishing Campaign

Cybercriminals are using Salesforce’s mass email service to dupe people into handing over credit card numbers, credentials and other personal information in a novel phishing campaign that highlights the threats to corporate networks that can come from whitelisted email addresses.

AWS S3 can be a security risk for your business

Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. This article discusses how new use cases are creating security risks for AWS S3 users, and best practices for organizations on how to protect their organizations with advanced threat protection services.
Dana Roth

Phisher Errors Lower Entry Barriers for Wanna-be Phishers

Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ a phishing scheme – without knowing any programming, going to the darknet or paying a thing.

TALK TO SALES

Ready to Try
Perception Point?