Attack Trends

You’re Invited: Rampant Phishing Abuses Eventbrite

In a new Eventbrite phishing campaign, threat actors misuse Eventbrite’s services to steal financial or personal information....
Attack Trends

Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse

In a new quishing campaign discovered by Perception Point’s security research team, threat actors took QR code phishing to a whole new level....
Industry Insights

Not-So-Lucky Number 7: Examples of Vendor Email Compromise Attempts

In this blog, we investigate how an innovative attacker tried to steal over $650,000 from the same organization with seven different VEC attempts....
Industry Insights

Beyond Add-Ons: Elevating Browser Governance Against Malicious and Risky Extensions

Browser extensions, plugins, add-ons – these tools may have many names but they have even more purposes, from enhancing productivity to personalizing the user’s browsing experience or adding useful features...
Attack Trends

Nespress-Oh No! Phishing Attack Exploits Nespresso Open Redirect Vulnerability

This blog post delves into how a Nespresso domain is being misused to redirect victims, urging urgent actions leading to the theft of Microsoft credentials....
Research

Evolving Email Security with Embedding Space and AI-powered Subject Analyzer

Perception Point has developed "Subject Analyzer," an NLP model that classifies email subjects to maximize detection of threats and spam....
Page

Advanced Email Security for Google Workspace

Advanced Email Security for Google Workspace Enhance your workspace security and augment Gmail’s native defenses against advanced email threats. Get a Demo How Perception Point Protects Your Google Environment Advanced...
Industry Insights

Top Flaws in Typical Email Security Solutions

Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security...
Industry Insights

Prevention at First Sight: Email Security Beyond URL Rewriting

In this blog, we consider the limitations of URL rewriting and how dynamic URL analysis is more effective against email-based attacks....
Industry Insights

5 Reasons Why Organizations Need Security Awareness Training

In this blog we review how Security Awareness Training can empower users to become an active line of defense....
Attack Trends

Navigating the Next Wave of Quishing Attacks

In this blog we investigate some of the emerging evasion techniques used in quishing attacks....
Attack Trends

Behind the Attack: LUMMA Malware

In this interesting InfoStealer attack, a threat actor leverages a multi-layered fake invoice campaign to distribute LUMMA malware. ...