Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade detection and steal credentials. This article has been indexed from…
Tag: Perception Point
Evasive ZIP Concatenation: Trojan Targets Windows Users
Threat actors continually seek innovative methods to evade detection, and ZIP file concatenation has proven to be an effective tactic. By exploiting the different ways ZIP readers and archive managers process concatenated ZIP files, attackers can embed malware that specifically…
You’re Invited: Rampant Phishing Abuses Eventbrite
In a new Eventbrite phishing campaign, threat actors misuse Eventbrite’s services to steal financial or personal information. This article has been indexed from Perception Point Read the original article: You’re Invited: Rampant Phishing Abuses Eventbrite
NIS 2 Directive: Key Facts Every Organization Needs to Know
Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance. This article has been indexed from Perception Point Read the original…
You Don’t Need an Agent to Secure Your Browser
Securing the browser has become more critical than ever, leading to the rise of browser security solutions. These solutions enhance the browser’s security capabilities, offering protection against phishing, malware, risky extensions, and more. The post You Don’t Need an Agent…
Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse
In a new quishing campaign discovered by Perception Point’s security research team, threat actors took QR code phishing to a whole new level. The post Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse appeared first on…
From Threats to Trends: Highlights from Perception Point’s H1 2024 Report
Cybersecurity is a constant cat-and-mouse game, with threat actors always refining their tactics to create more sophisticated and complex attacks, pushing defenses to evolve (ideally) even more quickly. The post From Threats to Trends: Highlights from Perception Point’s H1 2024…
Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing
In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten URLs, attackers mask highly evasive phishing links behind trusted domains…
Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts
Booking.com users are targeted by a new phishing campaign. Attackers use InfoStealer malware to compromise the the hospitality industry. The post Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts appeared first on Perception Point. This article has…
Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies
Perception Point researchers discover new InfoStealer malware campaign targeting the hospitality industry. The post Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies appeared first on Perception Point. This article has been indexed from Perception Point…
BEC Attack Roundup: Thread Hijack Edition
In this blog we look at real-life examples of thread hijacks, caught by our Advanced Threat Prevention platform before they could cost our customers millions. The post BEC Attack Roundup: Thread Hijack Edition appeared first on Perception Point. This article…
QR Code Red: Quishing Attacks and How to Prevent Them
Learn how cybercriminals exploit QR codes to deliver advanced phishing, or “quishing,” attacks and how Perception Point is stopping them. The post QR Code Red: Quishing Attacks and How to Prevent Them appeared first on Perception Point. This article has…
Investigating the Intricacies of BEC Invoice Redirect Attacks
In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of BEC Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception…
Investigating the Intricacies of Invoice Redirect Attacks
In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception Point…
How to Conduct a Phishing Attack in a 5 Easy Steps
Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing…
Takeaways From Perception Point’s “H1 2023 Report: Cybersecurity Trends & Insights”
In this blog post, we review the main takeaways from Perception Point’s “H1 2023: Cybersecurity Trends & Insights.” The post Takeaways From Perception Point’s “H1 2023 Report: Cybersecurity Trends & Insights” appeared first on Perception Point. This article has been…
Operation Geometrix Do Brasil
This blog reviews the tactics and operations behind a Brazilian cyber threat group Perception Point researchers are calling “GeoMetrix.” The post Operation Geometrix Do Brasil appeared first on Perception Point. This article has been indexed from Perception Point Read the…
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators – Technical Edition
Peeling back the layers of deception, we delve into a complex phishing operation that Perception Point researches have dubbed “Manipulated Caiman”. The post Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators – Technical Edition appeared first on Perception Point.…
Hackers Steal Over $55 Million in Mexican Financial Fraud
Perception Point researches have discovered a new phishing campaign, dubbed “Manipulated Caiman,” aimed at gaining unauthorized access to Mexican citizens’ bank accounts. The post Hackers Steal Over $55 Million in Mexican Financial Fraud appeared first on Perception Point. This article…
An AI for an AI: LLM-based Detection of GPT-Generated BEC Attacks
In this blog we explore the AI-powered threat landscape and unveil Perception Point’s innovative defense against GenAI-based email attacks. The post An AI for an AI: LLM-based Detection of GPT-Generated BEC Attacks appeared first on Perception Point. This article has…
Fighting Fire with Fire: Combatting LLM-Generated Social Engineering Attacks With LLMs
This blog investigates how cyber defenders can leverage LLMs to counteract attacks generated by the same source. The post Fighting Fire with Fire: Combatting LLM-Generated Social Engineering Attacks With LLMs appeared first on Perception Point. This article has been indexed…
Unpacking Verizon DBIR 2023: 3 Key Takeaways for Cyber Security Defenders
In this blog post, we explore key takeaways from the Verizon DBIR 2023 report. The post Unpacking Verizon DBIR 2023: 3 Key Takeaways for Cyber Security Defenders appeared first on Perception Point. This article has been indexed from Perception Point…
Operation Red Deer
Outing Aggah’s Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel The post <strong>Operation Red Deer</strong> appeared first on Perception Point. This article has been indexed from Perception Point Read the original article: Operation Red Deer
Securing Safari Browsers with Perception Point’s New Safari Extension
In this blog, we review how you can enhance your browser security with Perception Point’s new extension for Safari. The post Securing Safari Browsers with Perception Point’s New Safari Extension appeared first on Perception Point. This article has been indexed…
Behind the Attack: Account Takeover (ATO)
In this blog we explore the kill chain of a compromised mailbox, after a user has undergone an Account Takeover (ATO) attack. The post Behind the Attack: Account Takeover (ATO) appeared first on Perception Point. This article has been indexed…
AI: The Double-Edged Sword of Cybersecurity
Attackers are using AI in their cyber offense, but cybersecurity leaders can also take advantage of AI in their defense. The post AI: The Double-Edged Sword of Cybersecurity appeared first on Perception Point. This article has been indexed from Perception…
Hackers Use Password-Protected OneNote Files to Spread Malware
In this blog, we explore a new attack in which threat actors exploit encrypted OneNote documents to deliver malware. The post Hackers Use Password-Protected OneNote Files to Spread Malware appeared first on Perception Point. This article has been indexed from…
What Goes “App” Could Take You Down
Malicious File Uploads to Web Apps: The Risks and Best Practices to Prevent them. The post What Goes “App” Could Take You Down appeared first on Perception Point. This article has been indexed from Perception Point Read the original article:…
There’s Nothing “Meta” About Phishing for Credentials
There’s a new sophisticated phishing campaign making its rounds that aims to trick Facebook users into giving scammers their account credentials and PII by leveraging validation processes to seem credible. The post <strong>There’s Nothing “Meta” About Phishing for Credentials</strong> appeared…
Perception Point Recognized in 2023 Gartner® Market Guide for Email Security for Fourth Year in a Row
Perception Point is listed in the Gartner report as a Representative ICES Vendor for its Advanced Email Security, Advanced Internal Email Security, and Advanced Collaboration Security solutions The post Perception Point Recognized in 2023 Gartner® Market Guide for Email Security…
3 Key Takeaways from the 2023 Gartner Market Guide for Email Security
As email continues to be the primary vector for cyber attacks, staying up to date with the latest developments in email security is essential. In this blog post, we examine key insights from the latest Market Guide for Email Security…
One for the Show, Two for the Money
Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users’ inboxes. The post One for the Show, Two for the Money appeared first on Perception Point. This article has…
Behind the Attack: Paradies Clipper Malware
In this blog we cover a new underground Clipper malware that allows attacks to replace a victim’s crypto wallet with their own. The post Behind the Attack: Paradies Clipper Malware appeared first on Perception Point. This article has been indexed…
Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security
The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio The post Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue,…
Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue, and Expanding Portfolio into Web Security
The company is poised for continued rapid growth in 2023, fortified by a growing partner base and the availability of an extended product portfolio The post Perception Point Announces New Record Year, Protecting Over 2,000 Organizations, Doubling Annual Recurring Revenue,…
Takeaways from the CircleCI Incident
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the…
Malicious Office Macros: Detecting Similarity in the Wild
In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware. The post Malicious Office Macros: Detecting Similarity in the Wild appeared first on Perception Point. This article…
Zendesk – Is It A One Way “Ticket” to Ransomland?
In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform. The post Zendesk – Is It A One…
Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers
The integration provides crucial protection for businesses’ most vulnerable departments – help desks and customer support teams – preventing the most advanced threats sent by online users The post Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk…
Malicious Office Macros: Detecting Similarity in the Wild
Many security solutions employ signature-based detection. To bypass this, attackers often rely on existing malicious samples to create new samples that preserve the original malicious behavior but have distinct signatures. This is usually done with the help of malware toolkits…
Zendesk – Is It A One Way “Ticket” to Ransomland
In this blog, we will focus on Zendesk, a leading provider of customer support tools, and review its main security vulnerability and how organizations can best mitigate their risks on the platform. The post Zendesk – Is It A One…
The Rebranded Crypter: ScrubCrypt
In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware. The post The Rebranded Crypter: ScrubCrypt appeared first on Perception Point. This article has been indexed from Perception Point…