Phishing. What? Where? When?
What is phishing exactly, how the technique works and how to prevent it.
What is phishing exactly, how the technique works and how to prevent it.
How to close major loopholes in the digital-first enterprise.
Why shared drive services are sitting ducks for hackers, and how to close the gap.
We’ve spotted CVE-2017-8570, a.k.a the “Composite Moniker” in the wild alive and kicking.
Resume files can be dangerous, especially when they are encrypted word documents.
From uncovering a VBS backdoor that quotes the Fibonacci sequence to receiving “trust worthy” emails.
Recently we detected an attempt to leverage a known service, EFax, which is often utilized by our client, to trick employees into clicking on a phishing link.
APT28, a highly advanced attack also known as Fancy Bear, is associated with the Russian military intelligence agency GRU.
There is a rise in the usage of a phishing technique that tricks the user into thinking that an image of the attached file can be quickly opened in snapshot mode.
One of our customers received an email with a malicious document attached to an existing thread in order to seem like a legitimate email.
Most attacks tend to be “plain vanilla” – a phishing link, a fake website, a malicious executable and so on. But sometimes attackers can be particularly creative in the design of their technique. Recently our platform exposed such an approach.
Perception Point integrates with Box, leading Cloud Content Management Platform, to enhance security and threat detection
Perception Point, a leading provider of advanced threat protection to Email and Shared Drive services, has been recognized as a Select Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).
Achieving full R\W primitive with CVE-2019-0539
A dive into the root cause analysis of CVE-2019-0539 in Chakra javascript engine
Perception Point’s platform recently intercepted an attack leveraging the BYOB framework. This is the first time the BYOB framework is seen being used for fraudulent activity in the wild.
Our platform recently caught an advanced attack directed at one of our Financial Services customers delivered via a malicious MS Word document.
Our research team’s insights regarding changing the protection flags of memory regions in an arbitrary process.
Revisit an old exploit (CVE-2015-5122) and exploit it by using COOP
The logical flaw in software-only malware detection.
Watch out for this evolved phishing technique we’ve identified.
Zero day vulnerability in Linux Kernel found by Perception Point research team.