How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing so easy, even for the inexperienced.

Rebranding Perception Point

Perception Point New Branding

As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design.

Account Takeover Protection: A Real-life Example of an Email Attack Trend

standing shadow account takeover protection

A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a “normal” email correspondence. This is great evidence for the ultimate social engineering attack, showing how attackers are ever evolving, and that everyone needs account takeover protection.

BEC, Spear Phishing & Collaboration Examples in a single attack.

building windows spear phishing examples

While it is a known fact that phishing, BEC, and collaboration-tool based attacks are becoming more and more prevalent, it is even more interesting to see all three trends within one attack. In the attack described below, we see BEC, Spear Phishing & Collaboration Examples and how the attacker combines common impersonation techniques with the […]

Bringing PREVENTION Back!

Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session, you can also learn how Perception Point solves these issues and how we’re bringing PREVENTION is back.

The Triple Trouble: 3-Stage Phishing Attack.

clone phishing attack

Perception Point’s platform intercepted a unique, 3-stage attack that uses multiple evasion techniques, in order to infiltrate the targeted organization. In this post, we will present the complex attack and how Perception Point’s unique engines prevented it.

User Experience vs. Cyber Security

There’s a tension between security and business enablement. There’s also a tension between security and user experience. So what can you do about it? A full article on the dos and don’t’s on user experience in cybersecurity

Phishing Campaign Trend: Microsoft Teams.

In the following incident, it is very interesting to see how the attackers have improved their messaging and framework significantly to try trick the end-users. Just in the design there are several aspects to point out that are used to lure the end-user to follow the path as set by the attacker: Display name spoofing: […]

Campaign Alert: G Suite Phishing

sharks g suite account

Learn how Perception Point detected a widespread phishing attack campaign by noticing the common factor of G Suite account tools usage.

Statement of Account Email Attack

Learn about the widespread attack in which users first receive an email from an external source requesting an updated Statement of Account.

Campaign Alert: Call Me ASAP

old phones phishing site

Learn how attackers take an email address and insert it into the account name so users believes the site is legitimate in a recent campaign.

Incident Report: Fax Attack

paper stack phishing mail

Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.

Incident Report: Trick or Treat

beach phishing technique

In this post we discuss a phishing technique that tricks users into thinking an image of the attached file can be opened in snapshot mode.

Malicious Macro Commands

This incident analysis report provides a detailed understanding of an attack and the damage that macro commands could have caused. Read more.