Attack Vectors

Spear Phishing and Whaling

91% of all cybercrimes and cyber-attacks starting with a phishing email. A phishing attack is not a question of if – but when. Learn how Perception Point prevents phishing, spear-phishing, whaling, and any other impersonation attacks from getting to your employees’ mailboxes.

The Phishing, Spear Phishing and Whaling Attack Challenge

Phishing is one of the oldest tricks in the attacker’s playbook: an attack that leverages social engineering to obtain sensitive information. Phishing, spear phishing, and whaling attacks leverage URLs, files, and text-based techniques to deceive their target and gain access.


Many phishing attacks penetrate existing security measures due to  the rapid  creation of new variations and their resemblance to the “real-thing” becoming more and more accurate. Employees simply don’t have the time to analyze every individual email they receive.

multiple layers spearphishing

The Phishing, Spear Phishing and Whaling Cyber Kill Chain

graphic of a square

Step 1

Target Acquisition

The attacker gathers intelligence on the target, including personnel and technology data.

graphic of a flower

Step 2


The attacker chooses the best way to get in the organization, such as favorite payload or most exposed channel.

graphic of page on computer

Step 3

Grooming &

The attacker creates the “story” of the attack – for example, designing the message, writing a cover text, setting up the link, and more.

graphic of a hook

Step 4

Information Capture

The attacker logs the information gathered from the attack and validates the information by trying to log in using the target’s information.

skull icon going into a box

Step 5


The attacker leverages the log-in details to steal money, steal information or even sell the log-in credentials themselves to other parties.

Our Anti-phishing Technology

Perception Point has combined multiple layers of anti-phishing prevention, including propriety engines developed specifically to outsmart any advanced phishing attempts, and keep pace with the latest techniques:

Recursive Unpacker

Unpacks the most deeply embedded phishing attacks, even if highly concealed by the attacker.

Image-recognition engine

Proprietary engine uses several advanced image recognition algorithms to validate if any URL is a legitimate site.

URL Reputation

Incorporates data from the four top URL reputation engines monitoring global traffic for phishing attempts.

Threat Intelligence

Combines six different market-leading sources that leverage intelligence from external security vendors and the cyber community.

Our Advantages

#1 in Detection​

Next-gen capabilities provide the best coverage against any type of phishing attack. We actively scan all URLs received to ensure they are safe.

Anti-evasion capabilities

We uncover each and every file, URL, or hidden code, even if highly concealed or stored on a cloud storage platform, rendering advanced evasion techniques useless.

Holistic Coverage (Across Channels)

The anti-phishing engines are deployed across all channels we cover, providing equal protection against phishing – whether you are on email, in a messaging app, or cloud storage platforms.


All our solutions are deployed in a few clicks, creating zero fuss to you and your IT team.

Not Detection

Unfortunately, most employees still cannot differ between a phishing attempt and legitimate content – Perception Point’s platform ensures the phishing attack is stopped well before it gets to the end user.

In-depth Insights

Our Incident Response team checks and monitors every incident to ensure the most accurate detection rates, and to reduce strain on your SOC team.

See Perception Point in action!

Fill out the form and get a personalized demo of Perception Point.  We’ll send you a link to book a demo with our sales reps within one (1) business day.

Learn More