Account Takeover Protection: A Real-life Example of an Email Attack Trend

A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a “normal” email correspondence. This is great evidence for the ultimate social engineering attack, showing how attackers are ever evolving, and that everyone needs account takeover protection.
BEC, Spear Phishing & Collaboration Examples in a single attack.

While it is a known fact that phishing, BEC, and collaboration-tool based attacks are becoming more and more prevalent, it is even more interesting to see all three trends within one attack. In the attack described below, we see BEC, Spear Phishing & Collaboration Examples and how the attacker combines common impersonation techniques with the […]
Perception Point Launches App in The CrowdStrike Store

Perception Point’s unique X-Ray app enhances threat protection with game-changing incident containment across all users and channels
For the 2nd Year in a Row, Perception Point Recognized in Gartner’s 2020 Market Guide for Email Security

Perception Point has been recognized as a Representative Vendor in the new Integrated Email Security Solutions (IESS) category.
Emerging VAD Channel Next Signs Exclusive Distribution Deal with Perception Point

Channel Next, an emerging value-added distributor (VAD) has taken on the exclusive distribution of Perception Point, a global leader in advanced email and collaboration security threat prevention solutions, in the UAE.
The Fake Collaboration: Phishing Microsoft Planner and Teams

Fake Alert! Attackers now phish for user’s credentials using fake email and web pages of Microsoft Planner and Microsoft Teams. Read the full report to stay on top of the trend and see what you can do about it.
Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.
The Triple Trouble: 3-Stage Phishing Attack.

Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.
Perception Point is featured in DoiT International Product Exchange

Perception Point was selected to present its solution in DoiT’s webinar.
Tune in to learn about Cloud Storage Security from Shlomi Levin, our Co-founder & CTO had to say.
User Experience vs. Cyber Security

There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity
New cyber campaign leveraging OneDrive.

Perception Point has once again discovered a new attack trend hitting our clients. Perception Point intercepted this new attack campaign through its Advanced Cloud Storage Security solution. In this attack, we will show how attackers are leveraging OneDrive in order to evade detection and take advantage of a new attack vector.
COVID-19 – Update on New Cyber Campaigns.

Perception Point continues to bring you the latest in coronavirus-themed attacks, trying to show you the wide variety that we see daily. In the following update, one can see that attackers have been improving their messaging and are using the pandemic as a “background story” to the ongoing business handled between them and the targets. […]
Phishing Attempt Using Slack Referrer URL.

In this update, we will show how attackers are leveraging Slack referrer URL in order to lead victims to phishing pages, thus evading legacy solutions.
COVID-19 – Update on New Cyber Campaigns.

As the Coronavirus continues to keep organizations world wide working remotely, Perception point continues to see more and more “COVID-19” themed attacks. As always, they are improving in their sophistication and evasion. Below is an overview of 2 new attacks caught by our system, with an in-depth malware analysis of one of the campaigns
The Salesforce Loophole.

Overview. Today we present a blog that combines two main trends: (i) The use of collaboration channels to spread malware (Salesforce) and (ii) The increase in attackers’ sophistication and evasion techniques. In this case, the malicious actor tried to attack via the most popular CRM application in the world – Salesforce. This new “open vector” […]
COVID-19 – When the Virus Spreads to New Channels.

Today’s blog shows an interesting change in the way attackers act. Unlike previous incidents we published, this report lays out Coronavirus-themes attacks which are not originated from email but though other collaboration channels, such as cloud storage platform and files shared in internal networks. This shift demonstrates how attackers have been evolving and how they look for new ways into their targets.
COVID-19 – Update on New Cyber Campaigns.

Today’s report includes two attacks – a phishing using a spoofing technique and a malicious archived .exe file. Each of these attacks show how the attacker gathers intelligence on their targets. CISO’s and security experts must always be on top of the recent trends and make sure their security vendor knows how to stop these new attacks.
COVID-19 – Update on New Cyber Campaigns.

Perception Point continues to see more coronavirus-themed attacks, which seem to continuously increase by the day. Some of these campaigns have added new levels of complexity, such as the use of evasion techniques, as well as evolving with the attack story line itself. In the following update we collected three new attack campaigns and one […]
COVID-19 – Update on New Cyber Campaigns.

Perception Point continues to see more coronavirus-themed attacks, which seem to increase in quantities and improve in quality, by the day. In the following update we collected 3 different phishing attacks which demonstrate how attackers have evolved. We would like to highlight the “Key notes” for Phishing Campaign #2. These insights give CISOs and security experts additional […]
COVID-19 Malware Attacks

In this blog we provide COVID-19-themed cyberattack examples, focusing on COVID-19 malware attacks and phishing attempts.
COVID-19 Cyber Campaign: Domain Spoofing

In this post we provide examples of COVID-19 campaigns, caught by our advanced threat detection platform and analyzed by our IR team.
Perception Point Integrates With Box

Learn how Perception Point’s technology will integrated into Box’s solution, providing additional threat detection for Box customers.
AWS Selects Perception Point as a Technology Partner

Perception Point has been recognized as a Select Technology Partner in the Amazon Web Services (AWS) Partner Network.
Most Popular “At-Work” Apps are Among the Most Vulnerable to Cyberattacks

New Survey by Perception Point finds 80% of IT decision makers think popular “at-work” apps are the most vulnerable to cyberattacks.