Cyber Scams Know No Bounds

Phishing Attack Examples to Watch Out For | Perception Point

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email security solution prevented, which were then analyzed by the IR team.

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.

Top Flaws in Typical Email Security Solutions

Email Security Solutions

Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email security solution in place.

Slow Email Protection Software <br> Got You Down?

Slow email protection software

Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats.

Account Takeover Protection: A Real-life Example of an Email Attack Trend

standing shadow account takeover protection

A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a “normal” email correspondence. This is great evidence for the ultimate social engineering attack, showing how attackers are ever evolving, and that everyone needs account takeover protection.

Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.

The Triple Trouble: 3-Stage Phishing Attack.

clone phishing attack

Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.

User Experience vs. Cyber Security

There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity

Phishing Campaign Trend: Microsoft Teams.

In the following incident, it is very interesting to see how the attackers have improved their messaging and framework significantly to try trick the end-users. Just in the design there are several aspects to point out that are used to lure the end-user to follow the path as set by the attacker: Display name spoofing: […]

Statement of Account Email Attack

Learn about the widespread attack in which users first receive an email from an external source requesting an updated Statement of Account.