Page

Windows Virtual Desktop vs Citrix: Choose One or Use Both?

What is Windows Virtual Desktop? Windows Virtual Desktop (WVD) is a cloud-based solution for application virtualization. Using WVD on Azure enables you to: Configure a fully scalable Windows 10 multi-session...
Press

Perception Point Named Winner of Three Global InfoSec Awards during RSA Conference 2022

Perception Point Wins ‘Market Leader Browser Isolation’, ‘Hot Company Deep Sea Phishing’, and ‘Hot Company Email Security’ Awards at 10th Annual Global InfoSec Awards at RSAC 2022 ...
News

Successor to ‘Shrootless’ Bug Attacks Mac SIP Feature

Researchers at Perception Point write about CVE-2022-22583, a successor to Shrootless that could let attackers bypass Mac System Integrity Protection (SIP). It was patched yesterday in macOS Monterey 12.2, macOS...
Attack Trends

FormBook Is Back: This Time the Malware Attack Leverages Microsoft Excel

In this blog post, our Incident Response Team analyzes the attack chain of a FormBook malware campaign that recently targeted one of our customers by email. ...
Attack Trends

A Spear Phishing Attack Campaign Spoofing Leading Email Clients Including Microsoft, Gmail, WebMail, and WorldClient

In this sophisticated spear phishing campaign, attackers, using social engineering techniques, attempted to lure unsuspecting victims to enter their login credentials to fake login portals impersonating Microsoft, Gmail, WebMail, and...
Guides

OS Hardening: 15 Best Practices

What is OS Hardening? Operating system (OS) hardening, a type of system hardening, is the process of implementing security measures and patching for operating systems, such as Windows, Linux, or...
Attack Trends

How to Detect Malware: Hancitor Malware Delivered Using Spoofed Docusign Email and Microsoft Word

Perception Point’s advanced email security service managed to intercept thousands of attack emails impersonating DocuSign, utilizing the Hancitor Malware. The following blog details this alarming attack. ...
Research

Using CVE-2020-9971 to escape Microsoft Office’s app sandbox

In this blog, our researchers demonstrate how they were able to weaponize a Word document with a published macOS/iOS privilege escalation exploit, lift the app sandbox restrictions and gain higher...
Attack Trends

Qakbot Malware: Insights Into an Excel 4.0 Macro Attack

In this campaign, the attacker conceals malicious payload by deeply embedding it within multiple types of content and using different evasion techniques. Perception Point's IR team found loopholes and was...
Landing

Thank you for choosing Perception Point

Thank you for choosing Perception Point Register here to get started and begin protecting your Amazon S3 Buckets at the speed and scale of your business Your first 1,000 scans...
Research

Mac Isn’t Safe.
How Do You Like Them Apples?

Apple's security measures aren't enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers....
Attack Trends

Incident Report: Excel Macro Puzzle Attack

We discuss how attackers use a legitimate user’s email account and macro code to deliver malware as the response to an existing email thread....