Read the company overview to learn more about how Perception Point provides unparalleled prevention of advanced cyber threats across all attack vectors.
Read the company overview to learn more about how Perception point provides unparalleled prevention of all attacks across email, web browsers and cloud collaboration apps.
Read the company overview to learn more about how Perception point provides unparalleled prevention of all attacks across email, web browsers and cloud collaboration apps.
Check out our webinar in cooperation with Forrester — “Rethinking Email Security: Why Traditional Approaches Fail and Why You Can’t Afford to Ignore it”
Listen to Igal Lytzky, Incident Response Team Leader at Perception Point in a podcast episode for Security Magazine.
With new security threats emerging, security leaders are looking for ways to keep themselves informed. Some have begun utilizing social media for research and sharing what they’ve found amongst each other.
Find out more on this episode of The Security Podcastswith Igal Lytzki, a threat analyst and Incident Response team leader at Perception Point. Lytzki has practical experience in utilizing social media for threat intelligence and runs his own Twitter channel for sharing cyberattack trends.
Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!
This article first appeared in Security Magazine on August 9, 2023.
In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten URLs, attackers mask highly evasive phishing links behind trusted domains of security vendors, effectively bypassing detection. This abuse has led to a critical surge in advanced phishing attacks that leverage the very tools developed to prevent them.
Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade detection and steal credentials.
In recent research, the Perception Point team uncovered a new wave of attacks abusing DocuSign’s Web Forms—a feature designed for data collection and document management.
Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance.