Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing so easy, even for the inexperienced.
As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design.
A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a “normal” email correspondence. This is great evidence for the ultimate social engineering attack, showing how attackers are ever evolving, and that everyone needs account takeover protection.
While it is a known fact that phishing, BEC, and collaboration-tool based attacks are becoming more and more prevalent, it is even more interesting to see all three trends within one attack. In the attack described below, we see BEC, Spear Phishing & Collaboration Examples and how the attacker combines common impersonation techniques with the […]
What happens if you take a pinch of social engineering, a grain of evasion, and throw some anonymization techniques into the mix? Well, a perfect recipe for phishing. Check this example to see how attackers try to lure end-users to act wrongfully.
Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.
Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.
Introduction to one of the most common methods of communication
Perception Point was selected to present its solution in DoiT’s webinar.
Tune in to learn about Cloud Storage Security from Shlomi Levin, our Co-founder & CTO had to say.
There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity
An interview by Safety Detective with our CEO, Yoram Salinger, on his cybersecurity journey, his thoughts about the impact of COVID-19, and about Perception Point in a nutshell.
In the following incident, it is very interesting to see how the attackers have improved their messaging and framework significantly to try trick the end-users. Just in the design there are several aspects to point out that are used to lure the end-user to follow the path as set by the attacker: Display name spoofing: […]
Perception Point’s next-gen solution recognized within the Gartner cloud email security supplement (CESS) category. Learn more.
Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage.
Learn more about BEC (Business Email Compromise), an impersonation-based attack leveraging social engineering techniques.
Learn about the widespread attack in which users first receive an email from an external source requesting an updated Statement of Account.
Learn how attackers take an email address and insert it into the account name so users believes the site is legitimate in a recent campaign.
In this post we discuss how a cyber attack involving malicious macro code was disguised as a CV delivered via email.
Learn how the Fibonacci backdoor infection process grants an attacker control to remotely execute commands through malicious email.
Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.
In this post we discuss how Perception Point protects against highly advanced threats like APT28 (Fancy Bear).
In this post we discuss a phishing technique that tricks users into thinking an image of the attached file can be opened in snapshot mode.
In this post we discuss how the main aspect of hijacking is using a legitimate user’s email account in order to deliver malware.
We discuss how attackers use a legitimate user’s email account and macro code to deliver malware as the response to an existing email thread.
In this post we discuss how attackers are using fake passwords and logins to trick users in entering their real credentials.
This incident analysis report provides a detailed understanding of an attack and the damage that macro commands could have caused. Read more.