Tag: Perception Point

Evasive ZIP Concatenation: Trojan Targets Windows Users

Threat actors continually seek innovative methods to evade detection, and ZIP file concatenation has proven to be an effective tactic. By exploiting the different ways ZIP readers and archive managers process concatenated ZIP files, attackers can embed malware that specifically…

You’re Invited: Rampant Phishing Abuses Eventbrite

In a new Eventbrite phishing campaign, threat actors misuse Eventbrite’s services to steal financial or personal information. This article has been indexed from Perception Point Read the original article: You’re Invited: Rampant Phishing Abuses Eventbrite

NIS 2 Directive: Key Facts Every Organization Needs to Know

Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance. This article has been indexed from Perception Point Read the original…

You Don’t Need an Agent to Secure Your Browser

Securing the browser has become more critical than ever, leading to the rise of browser security solutions. These solutions enhance the browser’s security capabilities, offering protection against phishing, malware, risky extensions, and more. The post You Don’t Need an Agent…

BEC Attack Roundup: Thread Hijack Edition

In this blog we look at real-life examples of thread hijacks, caught by our Advanced Threat Prevention platform before they could cost our customers millions. The post BEC Attack Roundup: Thread Hijack Edition appeared first on Perception Point. This article…

QR Code Red: Quishing Attacks and How to Prevent Them

Learn how cybercriminals exploit QR codes to deliver advanced phishing, or “quishing,” attacks and how Perception Point is stopping them. The post QR Code Red: Quishing Attacks and How to Prevent Them appeared first on Perception Point. This article has…

Investigating the Intricacies of Invoice Redirect Attacks

In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception Point…

How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing…

Operation Geometrix Do Brasil

This blog reviews the tactics and operations behind a Brazilian cyber threat group Perception Point researchers are calling “GeoMetrix.” The post Operation Geometrix Do Brasil appeared first on Perception Point. This article has been indexed from Perception Point Read the…

Hackers Steal Over $55 Million in Mexican Financial Fraud

Perception Point researches have discovered a new phishing campaign, dubbed “Manipulated Caiman,” aimed at gaining unauthorized access to Mexican citizens’ bank accounts. The post Hackers Steal Over $55 Million in Mexican Financial Fraud appeared first on Perception Point. This article…

Operation Red Deer

Outing Aggah’s Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel The post <strong>Operation Red Deer</strong> appeared first on Perception Point. This article has been indexed from Perception Point Read the original article: Operation Red Deer

Behind the Attack: Account Takeover (ATO)

In this blog we explore the kill chain of a compromised mailbox, after a user has undergone an Account Takeover (ATO) attack. The post Behind the Attack: Account Takeover (ATO) appeared first on Perception Point. This article has been indexed…

AI: The Double-Edged Sword of Cybersecurity

Attackers are using AI in their cyber offense, but cybersecurity leaders can also take advantage of AI in their defense. The post AI: The Double-Edged Sword of Cybersecurity appeared first on Perception Point. This article has been indexed from Perception…

What Goes “App” Could Take You Down

Malicious File Uploads to Web Apps: The Risks and Best Practices to Prevent them. The post What Goes “App” Could Take You Down appeared first on Perception Point. This article has been indexed from Perception Point Read the original article:…

There’s Nothing “Meta” About Phishing for Credentials

There’s a new sophisticated phishing campaign making its rounds that aims to trick Facebook users into giving scammers their account credentials and PII by leveraging validation processes to seem credible. The post <strong>There’s Nothing “Meta” About Phishing for Credentials</strong> appeared…

One for the Show, Two for the Money

Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users’ inboxes. The post One for the Show, Two for the Money appeared first on Perception Point. This article has…

Behind the Attack: Paradies Clipper Malware

In this blog we cover a new underground Clipper malware that allows attacks to replace a victim’s crypto wallet with their own. The post Behind the Attack: Paradies Clipper Malware appeared first on Perception Point. This article has been indexed…

Takeaways from the CircleCI Incident

Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the…

Malicious Office Macros: Detecting Similarity in the Wild

Many security solutions employ signature-based detection. To bypass this, attackers often rely on existing malicious samples to create new samples that preserve the original malicious behavior but have distinct signatures. This is usually done with the help of malware toolkits…

The Rebranded Crypter: ScrubCrypt

In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware. The post The Rebranded Crypter: ScrubCrypt appeared first on Perception Point. This article has been indexed from Perception Point…