Perception Point Launches App in The CrowdStrike Store

Perception Point’s unique X-Ray app enhances threat protection with game-changing incident containment across all users and channels
The Salesforce Loophole.

Overview. Today we present a blog that combines two main trends: (i) The use of collaboration channels to spread malware (Salesforce) and (ii) The increase in attackers’ sophistication and evasion techniques. In this case, the malicious actor tried to attack via the most popular CRM application in the world – Salesforce. This new “open vector” […]
CVE-2019-0539 to Remote Code Execution (RCE)

This post reviews how to achieve a full R/W (Read/Write) primitive which can ultimately lead to a RCE (Remote Code Execution).
CVE-2019-0539 Root Cause Analysis

Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
CVE-2017-0199 (Still) In The Wild

Learn how Perception Point’s advanced threat detection platform caught an advanced attack (CVE-2017-0199) delivered via a malicious document.
Changing Memory Protection in an Arbitrary Process

In Linux, the API to change memory protection is called Mprotect or pkey_mprotect, and both operate on the current process’ address space.