Fake Alert! Attackers now phish for user’s credentials using fake email and web pages of Microsoft Planner and Microsoft Teams. Read the full report to stay on top of the trend and see what you can do about it.
Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.
Perception Point has identified attempts to phish Chase clients. Read this short blog to see how the attacker tried to impersonate to a prominent bank and how Perception Point prevented these attacks.
After testing a range of email hosted protection services, Perception Point wins SE Labs
Email Security Services Protection Award
In this update, we will show how attackers are leveraging Slack referrer URL in order to lead victims to phishing pages, thus evading legacy solutions.
In this blog, we will show how attackers take their creativeness to the next level by leveraging Google services in order to orchestrate new types of phishing attacks.
Learn more about BEC (Business Email Compromise), an impersonation-based attack leveraging social engineering techniques.
Learn how we intercepted an email thread that combined popular attack vectors: impersonation, encrypted archive, and a malicious macro.