Category: Perception Point

BEC Attack Roundup: Thread Hijack Edition

In this blog we look at real-life examples of thread hijacks, caught by our Advanced Threat Prevention platform before they could cost our customers millions. The post BEC Attack Roundup: Thread Hijack Edition appeared first on Perception Point. This article…

QR Code Red: Quishing Attacks and How to Prevent Them

Learn how cybercriminals exploit QR codes to deliver advanced phishing, or “quishing,” attacks and how Perception Point is stopping them. The post QR Code Red: Quishing Attacks and How to Prevent Them appeared first on Perception Point. This article has…

Investigating the Intricacies of Invoice Redirect Attacks

In this blog, we analyze the complexities of invoice redirect attacks by breaking down real life attack examples. The post Investigating the Intricacies of Invoice Redirect Attacks appeared first on Perception Point. This article has been indexed from Perception Point…

How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing…

Operation Geometrix Do Brasil

This blog reviews the tactics and operations behind a Brazilian cyber threat group Perception Point researchers are calling “GeoMetrix.” The post Operation Geometrix Do Brasil appeared first on Perception Point. This article has been indexed from Perception Point Read the…

Hackers Steal Over $55 Million in Mexican Financial Fraud

Perception Point researches have discovered a new phishing campaign, dubbed “Manipulated Caiman,” aimed at gaining unauthorized access to Mexican citizens’ bank accounts. The post Hackers Steal Over $55 Million in Mexican Financial Fraud appeared first on Perception Point. This article…

Operation Red Deer

Outing Aggah’s Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel The post <strong>Operation Red Deer</strong> appeared first on Perception Point. This article has been indexed from Perception Point Read the original article: Operation Red Deer

Behind the Attack: Account Takeover (ATO)

In this blog we explore the kill chain of a compromised mailbox, after a user has undergone an Account Takeover (ATO) attack. The post Behind the Attack: Account Takeover (ATO) appeared first on Perception Point. This article has been indexed…

AI: The Double-Edged Sword of Cybersecurity

Attackers are using AI in their cyber offense, but cybersecurity leaders can also take advantage of AI in their defense. The post AI: The Double-Edged Sword of Cybersecurity appeared first on Perception Point. This article has been indexed from Perception…

What Goes “App” Could Take You Down

Malicious File Uploads to Web Apps: The Risks and Best Practices to Prevent them. The post What Goes “App” Could Take You Down appeared first on Perception Point. This article has been indexed from Perception Point Read the original article:…

There’s Nothing “Meta” About Phishing for Credentials

There’s a new sophisticated phishing campaign making its rounds that aims to trick Facebook users into giving scammers their account credentials and PII by leveraging validation processes to seem credible. The post <strong>There’s Nothing “Meta” About Phishing for Credentials</strong> appeared…

One for the Show, Two for the Money

Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users’ inboxes. The post One for the Show, Two for the Money appeared first on Perception Point. This article has…

Behind the Attack: Paradies Clipper Malware

In this blog we cover a new underground Clipper malware that allows attacks to replace a victim’s crypto wallet with their own. The post Behind the Attack: Paradies Clipper Malware appeared first on Perception Point. This article has been indexed…

Takeaways from the CircleCI Incident

Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the…

Malicious Office Macros: Detecting Similarity in the Wild

Many security solutions employ signature-based detection. To bypass this, attackers often rely on existing malicious samples to create new samples that preserve the original malicious behavior but have distinct signatures. This is usually done with the help of malware toolkits…

The Rebranded Crypter: ScrubCrypt

In this blog we review the ScrubCrypter and how attackers are using phishing campaigns to distribute it and its accompanying malware. The post The Rebranded Crypter: ScrubCrypt appeared first on Perception Point. This article has been indexed from Perception Point…

Ho Ho No! Beware of These Holiday Phishing Scams

In this blog, we review four phishing attacks to watch out for this holiday season. The post Ho Ho No! Beware of These Holiday Phishing Scams appeared first on Perception Point. This article has been indexed from Perception Point Read…

Unleashing Enterprise-Grade Advanced Email Security

This article has been indexed from Perception Point Acronis Cyber Protect Cloud’s New Advance Pack, Now Powered by Perception Point, Blocks Email-Borne Threats from Reaching Client Inboxes The post Unleashing Enterprise-Grade Advanced Email Security appeared first on Perception Point. Read…

Phisher Errors Lower Entry Barriers for Wanna-be Phishers

Read the original article: Phisher Errors Lower Entry Barriers for Wanna-be Phishers Each year, it becomes easier for wanna-be phishers to create successful campaigns. This is well-known. But now, it’s at its easiest. Anyone can successfully set up and employ…

Top Flaws in Typical Email Security Solutions

Read the original article: Top Flaws in Typical Email Security Solutions Since its inception, Perception Point has been scanning billions of emails, URLs and files every week. Most of the time, Perception Point clients already have at least one email…

An Insider’s View into Blocking Email Threats

Read the original article: An Insider’s View into Blocking Email Threats The Importance of Blocking Crypto Viruses, Threats, and Attempted Phishing Attacks The post An Insider’s View into Blocking Email Threats appeared first on Perception Point. Read the original article:…

Netflix Phishing Scams Rise by 250% in 3 Months

Read the original article: Netflix Phishing Scams Rise by 250% in 3 Months The Perception Point Incident Response Team uncovered an interesting trend recently. It found a major increase in the number of Netflix Phishing scams this quarter compared to…

Netflix Phishing Scams Rise by 250% in 3 Months

Read the original article: Netflix Phishing Scams Rise by 250% in 3 Months The Perception Point Incident Response Team uncovered an interesting trend this week. It found a major increase (250%) in the number of Netflix Phishing scams this quarter…

‘CEO Fraud’ Phishing Kit on the Rise

Read the original article: ‘CEO Fraud’ Phishing Kit on the Rise The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. The post ‘CEO…

New ‘CEO Fraud’ Phishing Kit Scam on the Rise

Read the original article: New ‘CEO Fraud’ Phishing Kit Scam on the Rise The Perception Point IR Team recently uncovered a new CEO Fraud phishing kit that leverages Backblaze, a cloud-storage tool, to host fake Office 365 login pages. The…

Employee Security Training Proven Not Enough

Read the original article: Employee Security Training Proven Not Enough Train the machine—not just the employee. Hackers know many companies rely on security employee training alone, so they’ve been upping their game to trick even the most savvy employees into…

Employee Security Training Proven Not Enough

Read the original article: Employee Security Training Proven Not Enough Train the machine—not just the employee. Hackers know many companies rely on employee training alone, so they’ve been upping their game to trick even the most savvy employees into phishing…

Phishing Scams Mimic Legit-looking Log-in Pages

Read the original article: Phishing Scams Mimic Legit-looking Log-in Pages With the abundance of free website building tools available, it’s easier than ever for attackers to mimic legitimate brands by building fake log-in pages. And that’s exactly what’s been happening…

Default Email Security Might Not be Secure Enough

Read the original article: Default Email Security Might Not be Secure Enough The adoption of cloud email is increasing every year, with Google Workspace and Microsoft Office 365 dominating. And now, a new report by Gartner noted that many clients…

Default Email Security Might Not be Secure Enough

Read the original article: Default Email Security Might Not be Secure Enough The adoption of cloud email by organizations is increasing every year, with Google Workspace and Microsoft Office 365 dominating the market. And now, a new report by Gartner…

Default Email Security Might Not be Enough

Read the original article: Default Email Security Might Not be Enough The adoption of cloud email by organizations is increasing every year, with Google Workspace and Microsoft Office 365 dominating the market. And now, a new report by Gartner noted…

Don’t Forfeit Productivity for Internal Email Security

Read the original article: Don’t Forfeit Productivity for Internal Email Security Gone are the days of running down the hall to ask an important question and get the answer immediately. During remote work, our communication depends heavily on email to…

Rebranding Perception Point

Read the original article: Rebranding Perception Point As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. The post Rebranding Perception Point appeared first on Perception Point.   Become…

Slow Email Protection Software Got You Down?

Read the original article: Slow Email Protection Software Got You Down? Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats. The…

Zooming in on Zoom

Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad. Good because it makes it easy to work from home, and bad because it’s a security risk. Once a log-in page is necessary…

Slow Email Protection Software Got You Down?

Read the original article: Slow Email Protection Software Got You Down? Protecting email is an absolute necessity to continuing business operations. Despite this necessity, however, many end-users find their email protection software takes too long to scan for threats. The…

Rebranding Perception Point 2

Read the original article: Rebranding Perception Point 2 As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. The post Rebranding Perception Point 2 appeared first on Perception Point.…

Protected: Rebranding Perception Point

Read the original article: Protected: Rebranding Perception Point There is no excerpt because this is a protected post. The post Protected: Rebranding Perception Point appeared first on Perception Point.   Become a supporter of IT Security News and help us…

Rebranding Perception Point

Read the original article: Rebranding Perception Point As some of you might have noticed, Perception Point is sporting a brand-new website, including updated messaging and a new design. This represents a significant milestone in our journey. It reflects our growth…

Zooming in on Zoom

Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad. Good because it makes it easy to work from home, and bad because it’s a security risk. Once a log-in page is necessary…

Zooming in on Zoom

Read the original article: Zooming in on Zoom Zoom is growing quickly, which is good and bad because once a log-in page is necessary (such as in Zoom)—a new loophole for stealing credentials is created. The post Zooming in on…

New Wave of Malicious Excel 4.0 Macros

Read the original article: New Wave of Malicious Excel 4.0 Macros Excel 4.0 macros have been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely…

BYOB (Build Your Own Botnet) in action.

Read the original article: BYOB (Build Your Own Botnet) in action. What is BYOB (Build Your Own Botnet)? In today’s cyber security world, the gap between the expertise required to carry out a high quality attack and the understanding of…

New Wave of Malicious Excel 4.0 Macros

Read the original article: New Wave of Malicious Excel 4.0 Macros Excel 4.0 macros has been here for almost three decades, but this year, attackers have found new ways to weaponize them. It’s bad news for companies that still rely…

Mac Isn’t Safe. How Do You Like Them Apples?

Read the original article: Mac Isn’t Safe. How Do You Like Them Apples? Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple…

Perception Point now protects MacOS against cyber attacks

Read the original article: Perception Point now protects MacOS against cyber attacks Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple computers.…

Mac Isn’t Safe. How Do You Like Them Apples?

Read the original article: Mac Isn’t Safe. How Do You Like Them Apples? Apple’s security measures aren’t enough anymore. Fortunately, there is a new solution. Our Advanced Email and Collaboration Protection now prevents attackers from using APTs to target Apple…

Perception Point X-Ray

Read the original article: Perception Point X-Ray Solving the containment & remediation problem of incidents across the organization together with CrowdStrike Falcon The post Perception Point X-Ray appeared first on Perception Point.   Become a supporter of IT Security News…

Perception Point X-Ray

Read the original article: Perception Point X-Ray Solving the containment & remediation problem of incidents across the organization together with CrowdStrike Falcon The post Perception Point X-Ray appeared first on Perception Point.   Become a supporter of IT Security News…

A Recipe for Phishing

Read the original article: A Recipe for Phishing What happens if you take a pinch of social engineering, a grain of evasion, and throw some anonymization techniques into the mix? Well, a perfect recipe for phishing. Check this example to…

The Fake Slack

Read the original article: The Fake Slack The downside of being famous is that you don’t get to choose your audience. See how attackers use Slack’s brand to phish for credentials. The post The Fake Slack appeared first on Perception…

Bringing PREVENTION Back!

Read the original article: Bringing PREVENTION Back! Listen to this short podcast to learn about content-based threats, the potential cyber threats of collaboration tools, and how the COVID-19 pandemic affects the current threat landscape. At the end of this session,…

“Accept Phishing Message” – The SendGrid Scheme

Read the original article: “Accept Phishing Message” – The SendGrid Scheme Attackers are ever-improving. See how they learned to leverage SendGrid’s to gain from two main benefits: evading email security measures and improve their trial and error process to improve…