The Triple Trouble: 3-Stage Phishing Attack.

clone phishing attack

Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.

Incident Report: A Combined Attack

guy with mask attack vectors

Learn how we intercepted an email thread that combined popular attack vectors: impersonation, encrypted archive, and a malicious macro.