Page

Windows Virtual Desktop vs Citrix: Choose One or Use Both?

What is Windows Virtual Desktop? Windows Virtual Desktop (WVD) is a cloud-based solution for application virtualization. Using WVD on Azure enables you to: Configure a fully scalable Windows 10 multi-session...
Attack Trends

FormBook Is Back: This Time the Malware Attack Leverages Microsoft Excel

In this blog post, our Incident Response Team analyzes the attack chain of a FormBook malware campaign that recently targeted one of our customers by email. ...
Attack Trends

A Spear Phishing Attack Campaign Spoofing Leading Email Clients Including Microsoft, Gmail, WebMail, and WorldClient

In this sophisticated spear phishing campaign, attackers, using social engineering techniques, attempted to lure unsuspecting victims to enter their login credentials to fake login portals impersonating Microsoft, Gmail, WebMail, and...
Attack Trends

How to Detect Malware: Hancitor Malware Delivered Using Spoofed Docusign Email and Microsoft Word

Perception Point’s advanced email security service managed to intercept thousands of attack emails impersonating DocuSign, utilizing the Hancitor Malware. The following blog details this alarming attack. ...
Research

Using CVE-2020-9971 to escape Microsoft Office’s app sandbox

In this blog, our researchers demonstrate how they were able to weaponize a Word document with a published macOS/iOS privilege escalation exploit, lift the app sandbox restrictions and gain higher...
Attack Trends

Qakbot Malware: Insights Into an Excel 4.0 Macro Attack

In this campaign, the attacker conceals malicious payload by deeply embedding it within multiple types of content and using different evasion techniques. Perception Point's IR team found loopholes and was...
Attack Trends

BEC: You Have (Almost) Been Compromised!

Learn more about BEC (Business Email Compromise), an impersonation-based attack leveraging social engineering techniques....
Attack Trends

Incident Report: Excel Macro Puzzle Attack

We discuss how attackers use a legitimate user’s email account and macro code to deliver malware as the response to an existing email thread....
Attack Trends

Malicious Microsoft Office Attachments On The Rise

In this post we discuss the rise of cyberattacks originating from malicious Microsoft Office attachments and what you can do about it....
Industry Insights

Securing Safari Browsers with Perception Point’s New Safari Extension

In this blog, we review how you can enhance your browser security with Perception Point's new extension for Safari....
Research

BYOB (Build Your Own Botnet) in action.

Attacks leveraging the BYOB framework for fraudulent activity in the wild has been around for a few years now. We believe that the cyber security community can expect to see...
Attack Trends

Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing

In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten...