Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade detection and steal credentials. This article has been indexed from…
Category: Perception Point
Evasive ZIP Concatenation: Trojan Targets Windows Users
Threat actors continually seek innovative methods to evade detection, and ZIP file concatenation has proven to be an effective tactic. By exploiting the different ways ZIP readers and archive managers process concatenated ZIP files, attackers can embed malware that specifically…
You’re Invited: Rampant Phishing Abuses Eventbrite
In a new Eventbrite phishing campaign, threat actors misuse Eventbrite’s services to steal financial or personal information. This article has been indexed from Perception Point Read the original article: You’re Invited: Rampant Phishing Abuses Eventbrite
NIS 2 Directive: Key Facts Every Organization Needs to Know
Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance. This article has been indexed from Perception Point Read the original…
You Don’t Need an Agent to Secure Your Browser
Securing the browser has become more critical than ever, leading to the rise of browser security solutions. These solutions enhance the browser’s security capabilities, offering protection against phishing, malware, risky extensions, and more. The post You Don’t Need an Agent…
Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse
In a new quishing campaign discovered by Perception Point’s security research team, threat actors took QR code phishing to a whole new level. The post Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse appeared first on…
From Threats to Trends: Highlights from Perception Point’s H1 2024 Report
Cybersecurity is a constant cat-and-mouse game, with threat actors always refining their tactics to create more sophisticated and complex attacks, pushing defenses to evolve (ideally) even more quickly. The post From Threats to Trends: Highlights from Perception Point’s H1 2024…
Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing
In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten URLs, attackers mask highly evasive phishing links behind trusted domains…
Perception Point Recognized as 2023 Strong Performer in Gartner Peer Insights ‘Voice of the Customer’ for Email Security
Perception Point’s commitment to customers has been acknowledged in the 2023 Strong Performer in Gartner Peer Insights ‘Voice of the Customer’ for Email Security. The post Perception Point Recognized as 2023 Strong Performer in Gartner Peer Insights ‘Voice of the Customer’ for Email Security appeared…
Perception Point Recognized as Gartner Peer Insights Strong Performer for Email Security
Perception Point’s commitment to customers has been acknowledged in the 2023 Gartner Peer Insights Strong Performer for Email Security. The post Perception Point Recognized as Gartner Peer Insights Strong Performer for Email Security appeared first on Perception Point. This article has…
Perception Point Recognized as Gartner Peer Insights Customers’ Choice for Email Security
Perception Point’s commitment to customers has been acknowledged in the 2023 Gartner Peer Insights Customers’ Choice for Email Security. The post Perception Point Recognized as Gartner Peer Insights Customers’ Choice for Email Security appeared first on Perception Point. This article has…
Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts
Booking.com users are targeted by a new phishing campaign. Attackers use InfoStealer malware to compromise the the hospitality industry. The post Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts appeared first on Perception Point. This article has…
Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies
Perception Point researchers discover new InfoStealer malware campaign targeting the hospitality industry. The post Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies appeared first on Perception Point. This article has been indexed from Perception Point…
BEC Attack Roundup: Thread Hijack Edition
In this blog we look at real-life examples of thread hijacks, caught by our Advanced Threat Prevention platform before they could cost our customers millions. The post BEC Attack Roundup: Thread Hijack Edition appeared first on Perception Point. This article…
QR Code Red: Quishing Attacks and How to Prevent Them
Learn how cybercriminals exploit QR codes to deliver advanced phishing, or “quishing,” attacks and how Perception Point is stopping them. The post QR Code Red: Quishing Attacks and How to Prevent Them appeared first on Perception Point. This article has…
Investigating the Intricacies of BEC Invoice Redirect Attacks
In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of BEC Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception…
Investigating the Intricacies of Invoice Redirect Attacks
In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception Point…
How to Conduct a Phishing Attack in a 5 Easy Steps
Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing…
Takeaways From Perception Point’s “H1 2023 Report: Cybersecurity Trends & Insights”
In this blog post, we review the main takeaways from Perception Point’s “H1 2023: Cybersecurity Trends & Insights.” The post Takeaways From Perception Point’s “H1 2023 Report: Cybersecurity Trends & Insights” appeared first on Perception Point. This article has been…
Operation Geometrix Do Brasil
This blog reviews the tactics and operations behind a Brazilian cyber threat group Perception Point researchers are calling “GeoMetrix.” The post Operation Geometrix Do Brasil appeared first on Perception Point. This article has been indexed from Perception Point Read the…
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators – Technical Edition
Peeling back the layers of deception, we delve into a complex phishing operation that Perception Point researches have dubbed “Manipulated Caiman”. The post Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators – Technical Edition appeared first on Perception Point.…
Hackers Steal Over $55 Million in Mexican Financial Fraud
Perception Point researches have discovered a new phishing campaign, dubbed “Manipulated Caiman,” aimed at gaining unauthorized access to Mexican citizens’ bank accounts. The post Hackers Steal Over $55 Million in Mexican Financial Fraud appeared first on Perception Point. This article…
An AI for an AI: LLM-based Detection of GPT-Generated BEC Attacks
In this blog we explore the AI-powered threat landscape and unveil Perception Point’s innovative defense against GenAI-based email attacks. The post An AI for an AI: LLM-based Detection of GPT-Generated BEC Attacks appeared first on Perception Point. This article has…
Fighting Fire with Fire: Combatting LLM-Generated Social Engineering Attacks With LLMs
This blog investigates how cyber defenders can leverage LLMs to counteract attacks generated by the same source. The post Fighting Fire with Fire: Combatting LLM-Generated Social Engineering Attacks With LLMs appeared first on Perception Point. This article has been indexed…
Unpacking Verizon DBIR 2023: 3 Key Takeaways for Cyber Security Defenders
In this blog post, we explore key takeaways from the Verizon DBIR 2023 report. The post Unpacking Verizon DBIR 2023: 3 Key Takeaways for Cyber Security Defenders appeared first on Perception Point. This article has been indexed from Perception Point…
Operation Red Deer
Outing Aggah’s Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel The post <strong>Operation Red Deer</strong> appeared first on Perception Point. This article has been indexed from Perception Point Read the original article: Operation Red Deer
Securing Safari Browsers with Perception Point’s New Safari Extension
In this blog, we review how you can enhance your browser security with Perception Point’s new extension for Safari. The post Securing Safari Browsers with Perception Point’s New Safari Extension appeared first on Perception Point. This article has been indexed…
Behind the Attack: Account Takeover (ATO)
In this blog we explore the kill chain of a compromised mailbox, after a user has undergone an Account Takeover (ATO) attack. The post Behind the Attack: Account Takeover (ATO) appeared first on Perception Point. This article has been indexed…
AI: The Double-Edged Sword of Cybersecurity
Attackers are using AI in their cyber offense, but cybersecurity leaders can also take advantage of AI in their defense. The post AI: The Double-Edged Sword of Cybersecurity appeared first on Perception Point. This article has been indexed from Perception…
Hackers Use Password-Protected OneNote Files to Spread Malware
In this blog, we explore a new attack in which threat actors exploit encrypted OneNote documents to deliver malware. The post Hackers Use Password-Protected OneNote Files to Spread Malware appeared first on Perception Point. This article has been indexed from…
What Goes “App” Could Take You Down
Malicious File Uploads to Web Apps: The Risks and Best Practices to Prevent them. The post What Goes “App” Could Take You Down appeared first on Perception Point. This article has been indexed from Perception Point Read the original article:…
There’s Nothing “Meta” About Phishing for Credentials
There’s a new sophisticated phishing campaign making its rounds that aims to trick Facebook users into giving scammers their account credentials and PII by leveraging validation processes to seem credible. The post <strong>There’s Nothing “Meta” About Phishing for Credentials</strong> appeared…
Perception Point Recognized in 2023 Gartner® Market Guide for Email Security for Fourth Year in a Row
Perception Point is listed in the Gartner report as a Representative ICES Vendor for its Advanced Email Security, Advanced Internal Email Security, and Advanced Collaboration Security solutions The post Perception Point Recognized in 2023 Gartner® Market Guide for Email Security…
3 Key Takeaways from the 2023 Gartner Market Guide for Email Security
As email continues to be the primary vector for cyber attacks, staying up to date with the latest developments in email security is essential. In this blog post, we examine key insights from the latest Market Guide for Email Security…
One for the Show, Two for the Money
Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users’ inboxes. The post One for the Show, Two for the Money appeared first on Perception Point. This article has…
Behind the Attack: Paradies Clipper Malware
In this blog we cover a new underground Clipper malware that allows attacks to replace a victim’s crypto wallet with their own. The post Behind the Attack: Paradies Clipper Malware appeared first on Perception Point. This article has been indexed…
Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security
The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio The post Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue,…
Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security
The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio The post Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue,…
Takeaways from the CircleCI Incident
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the…
Malicious Office Macros: Detecting Similarity in the Wild
In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware. The post Malicious Office Macros: Detecting Similarity in the Wild appeared first on Perception Point. This article…
Zendesk – Is It A One Way “Ticket” to Ransomland?
In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform. The post Zendesk – Is It A One…
Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers
The integration provides crucial protection for businesses’ most vulnerable departments – help desks and customer support teams – preventing the most advanced threats sent by online users The post Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk…
Malicious Office Macros: Detecting Similarity in the Wild
Many security solutions employ signature-based detection. To bypass this, attackers often rely on existing malicious samples to create new samples that preserve the original malicious behavior but have distinct signatures. This is usually done with the help of malware toolkits…
Zendesk – Is It A One Way “Ticket” to Ransomland
In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform. The post Zendesk – Is It A One…
The Rebranded Crypter: ScrubCrypt
In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware. The post The Rebranded Crypter: ScrubCrypt appeared first on Perception Point. This article has been indexed from Perception Point…
Ho Ho No! Beware of These Holiday Phishing Scams
In this blog, we review four phishing attacks to watch out for this holiday season. The post Ho Ho No! Beware of These Holiday Phishing Scams appeared first on Perception Point. This article has been indexed from Perception Point Read…
Phishing Campaign for Stealing USPS Customers’ Credit Cards Details
This article has been indexed from Perception Point A sophisticated attack spoofing the United States Postal Service lures unsuspected users to enter their personal information and credit card numbers. The post Phishing Campaign for Stealing USPS Customers’ Credit Cards Details…
Using CVE-2020-9971 to escape Microsoft Office’s app sandbox
This article has been indexed from Perception Point In this blog, our researchers demonstrate how they were able to weaponize a Word document with a published macOS/iOS privilege escalation exploit, lift the app sandbox restrictions and gain higher privileges. The…
Using CVE-2020-9971 to escape Microsoft Office’s app sandbox
This article has been indexed from Perception Point In this blog, our researcher demonstrates how he was able to weaponize in macOS/iOS a Word document with a published privilege escalation exploit, lift those access restrictions and gain higher privileges. The…
Dangerous Phishing Campaign for Harvesting Credentials using an HTML Attachment
This article has been indexed from Perception Point Be aware. Attackers are impersonating legitimate brands, attaching to emails an HTML file containing a fake log-in page, intended for harvesting credentials. To complete the disguise, they finish with redirecting to the…
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
This article has been indexed from Perception Point In this campaign, the attacker conceals malicious payload by deeply embedding it within multiple types of content and using different evasion techniques. Perception Point’s IR team found loopholes and was able to…
Unleashing Enterprise-Grade Advanced Email Security
This article has been indexed from Perception Point Acronis Cyber Protect Cloud’s New Advance Pack, Now Powered by Perception Point, Blocks Email-Borne Threats from Reaching Client Inboxes The post Unleashing Enterprise-Grade Advanced Email Security appeared first on Perception Point. Read…
Acronis arms service providers with Advanced Email Security to stop all email cyberthreats
This article has been indexed from Perception Point Acronis Cyber Protect Cloud’s new advance pack, powered by Perception Point, blocks email-borne threats from reaching client inboxes The post Acronis arms service providers with Advanced Email Security to stop all email…
Perception Point Named Winner of the Global InfoSec Awards during RSA Conference 2021
This article has been indexed from Perception Point Company wins Publisher’s Choice award in Email Security and Management for its advanced threat prevention-as-a-service offering. The post Perception Point Named Winner of the Global InfoSec Awards during RSA Conference 2021 appeared…
Perception Point Named Winner of the Global InfoSec Awards during RSA Conference 2021
This article has been indexed from Perception Point Company wins Publisher’s Choice award in Email Security and Management for its advanced threat prevention-as-a-service offering. The post Perception Point Named Winner of the Global InfoSec Awards during RSA Conference 2021 appeared…
Phisher Errors Lower Entry Barriers for Wanna-be Phishers
Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ a phishing scheme – without knowing any programming, going to the darknet…
Perception Point Raises $28 Million Grow Collaboration Protection Platform
The solution integrates natively with apps and services including AWS S3, Slack, Google Drive, Microsoft Exchange and SharePoint, Salesforce, Dropbox, Evernote, Box, and many more. The post Perception Point Raises $28 Million Grow Collaboration Protection Platform appeared first on Perception…
Phisher Errors Lower Entry Barriers for Wanna-be Phishers
Read the original article: Phisher Errors Lower Entry Barriers for Wanna-be Phishers Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ…
Perception Point CEO Reveals His Top Strategies for Aggressive Growth
Read the original article: Perception Point CEO Reveals His Top Strategies for Aggressive Growth Yoram Salinger, Perception Point’s CEO, sits down with Channelbuzz.ca for an exclusive interview. The post Perception Point CEO Reveals His Top Strategies for Aggressive Growth appeared…
Top Flaws in Typical Email Security Solutions
Read the original article: Top Flaws in Typical Email Security Solutions Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email…
Perception Point Raises $28 Million Grow Collaboration Protection Platform
Read the original article: Perception Point Raises $28 Million Grow Collaboration Protection Platform The solution integrates natively with apps and services including AWS S3, Slack, Google Drive, Microsoft Exchange and SharePoint, Salesforce, Dropbox, Evernote, Box, and many more. The post…
Perception Point Raises $28 Million in Series B Funding to Advance Messaging and Collaboration Protection for Enterprise Users
Read the original article: Perception Point Raises $28 Million in Series B Funding to Advance Messaging and Collaboration Protection for Enterprise Users Perception Point, a leading email and collaboration security company, has raised $28 million in Series B, bringing the…
Perception Point raises $28 million to grow Prevention-as-a-Service solution
Read the original article: Perception Point raises $28 million to grow Prevention-as-a-Service solution Israeli cybersecurity startup Perception Point announced on Wednesday that it has raised $28 million in a series B funding round. The post Perception Point raises $28 million…
Perception Point gets aggressive in competitor takeout strategy with new funding round, and addition of channel component
Read the original article: Perception Point gets aggressive in competitor takeout strategy with new funding round, and addition of channel component “While some of our competitors just do one thing, like stop phishing attacks, attacks today are often combinations of…
Perception Point Raises $28 Million in Series B Funding to Advance Messaging and Collaboration Protection for Enterprise Users
Read the original article: Perception Point Raises $28 Million in Series B Funding to Advance Messaging and Collaboration Protection for Enterprise Users Company triples recurring revenue amid increased customer demand for advanced cyber threat protection The post Perception Point Raises…
An Insider’s View into Blocking Email Threats
Read the original article: An Insider’s View into Blocking Email Threats The Importance of Blocking Crypto Viruses, Threats, and Attempted Phishing Attacks The post An Insider’s View into Blocking Email Threats appeared first on Perception Point. Read the original article:…
Netflix Phishing Scams Rise by 250% in 3 Months
Read the original article: Netflix Phishing Scams Rise by 250% in 3 Months The Perception Point Incident Response Team uncovered an interesting trend recently. It found a major increase in the number of Netflix Phishing scams this quarter compared to…
Netflix Phishing Scams Rise by 250% in 3 Months
Read the original article: Netflix Phishing Scams Rise by 250% in 3 Months The Perception Point Incident Response Team uncovered an interesting trend this week. It found a major increase (250%) in the number of Netflix Phishing scams this quarter…
‘CEO Fraud’ Phishing Kit on the Rise
Read the original article: ‘CEO Fraud’ Phishing Kit on the Rise The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. The post ‘CEO…
New ‘CEO Fraud’ Phishing Kit Scam on the Rise
Read the original article: New ‘CEO Fraud’ Phishing Kit Scam on the Rise The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. The…
Employee Security Training Proven Not Enough
Read the original article: Employee Security Training Proven Not Enough Train the machine—not just the employee. Hackers know many companies rely on security employee training alone, so they’ve been upping their game to trick even the most savvy employees into…
Employee Security Training Proven Not Enough
Read the original article: Employee Security Training Proven Not Enough Train the machine—not just the employee. Hackers know many companies rely on employee training alone, so they’ve been upping their game to trick even the most savvy employees into phishing…
Phishing Scams Hosted on Free Website and Form Building Tools Increases
Read the original article: Phishing Scams Hosted on Free Website and Form Building Tools Increases With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And…
Phishing Scams Being Hosted on Free Site and Form Builder Tools
Read the original article: Phishing Scams Being Hosted on Free Site and Form Builder Tools With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And…
Phishing Scams Mimic Legit-looking Log-in Pages
Read the original article: Phishing Scams Mimic Legit-looking Log-in Pages With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And that’s exactly what’s been happening…
Default Email Security Might Not be Secure Enough
Read the original article: Default Email Security Might Not be Secure Enough The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients…
Default Email Security Might Not be Secure Enough
Read the original article: Default Email Security Might Not be Secure Enough The adoption of cloud email by organizations is increasing every year, with Google Workspace and Microsoft Office 365 dominating the market. And now, a new report by Gartner…
Default Email Security Might Not be Enough
Read the original article: Default Email Security Might Not be Enough The adoption of cloud email by organizations is increasing every year, with Google Workspace and Microsoft Office 365 dominating the market. And now, a new report by Gartner noted…
Don’t Forfeit Productivity for Internal Email Security
Read the original article: Don’t Forfeit Productivity for Internal Email Security Gone are the days of running down the hall to ask an important question and get the answer immediately. During remote work, our communication depends heavily on email to…
Rebranding Perception Point
Read the original article: Rebranding Perception Point As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. The post Rebranding Perception Point appeared first on Perception Point. Become…
Slow Email Protection Software Got You Down?
Read the original article: Slow Email Protection Software Got You Down? Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats. The…
Zooming in on Zoom
Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad. Good because it makes it easy to work from home, and bad because it’s a security risk. Once a log-in page is necessary…
Slow Email Protection Software Got You Down?
Read the original article: Slow Email Protection Software Got You Down? Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats. The…
Rebranding Perception Point 2
Read the original article: Rebranding Perception Point 2 As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. The post Rebranding Perception Point 2 appeared first on Perception Point.…
Protected: Rebranding Perception Point
Read the original article: Protected: Rebranding Perception Point There is no excerpt because this is a protected post. The post Protected: Rebranding Perception Point appeared first on Perception Point. Become a supporter of IT Security News and help us…
Rebranding Perception Point
Read the original article: Rebranding Perception Point As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. This represents a significant milestone in our journey. It reflects our growth…
Zooming in on Zoom
Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad. Good because it makes it easy to work from home, and bad because it’s a security risk. Once a log-in page is necessary…
Zooming in on Zoom
Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad because once a log-in page is necessary (such as in Zoom)—a new loophole for stealing credentials is created. The post Zooming in on…
New Wave of Malicious Excel 4.0 Macros
Read the original article: New Wave of Malicious Excel 4.0 Macros Excel 4.0 macros have been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely…
The ATO Threat: A Real-life Example for The Newest Email Attack Trend
Read the original article: The ATO Threat: A Real-life Example for The Newest Email Attack Trend A unique example of an Account Takeover (ATO): an “injected” email turns out to be an attempt to insert malware as part of a…
BYOB (Build Your Own Botnet) in action.
Read the original article: BYOB (Build Your Own Botnet) in action. What is BYOB (Build Your Own Botnet)? In today’s cyber security world, the gap between the expertise required to carry out a high quality attack and the understanding of…
New Wave of Malicious Excel 4.0 Macros
Read the original article: New Wave of Malicious Excel 4.0 Macros Excel 4.0 macros has been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely…
Mac Isn’t Safe. How Do You Like Them Apples?
Read the original article: Mac Isn’t Safe. How Do You Like Them Apples? Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple…
Perception Point now protects MacOS against cyber attacks
Read the original article: Perception Point now protects MacOS against cyber attacks Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers.…
Mac Isn’t Safe. How Do You Like Them Apples?
Read the original article: Mac Isn’t Safe. How Do You Like Them Apples? Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple…
On-brand Phishing: When Attackers Use Your Assets Against You
Read the original article: On-brand Phishing: When Attackers Use Your Assets Against You A detailed, to-the-point analysis of the most phished brands in email attacks and the importance of asset-based protection as c. 50% of attacks are actually related to…
Perception Point X-Ray
Read the original article: Perception Point X-Ray Solving the containment & remediation problem of incidents across the organization together with CrowdStrike Falcon The post Perception Point X-Ray appeared first on Perception Point. Become a supporter of IT Security News…
Perception Point X-Ray
Read the original article: Perception Point X-Ray Solving the containment & remediation problem of incidents across the organization together with CrowdStrike Falcon The post Perception Point X-Ray appeared first on Perception Point. Become a supporter of IT Security News…
“Fake it till you make it” – Top 4 Phishing Tricks for September-October 2020
Read the original article: “Fake it till you make it” – Top 4 Phishing Tricks for September-October 2020 Stay up to date with the latest phishing trends and tricks. We now focus on 4 points that can surely help you…
For the 2nd year in a row: Perception Point Recognized in Gartner’s 2020 Market Guide for Email Security.
Read the original article: For the 2nd year in a row: Perception Point Recognized in Gartner’s 2020 Market Guide for Email Security. Perception Point has been recognized as a Representative Vendor in the new Integrated Email Security Solutions (IESS) category.…