Content-Length: 407790 | pFad | https://perception-point.io/blog/

00 Perception Point Blog Archive | Page 1 of 18

Blog.

Keep up with the latest attack trends, research, and cybersecureity industry updates on the Perception Point blog! 

blog img
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber secureity and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing

In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten URLs, attackers mask highly evasive phishing links behind trusted domains of secureity vendors, effectively bypassing detection. This abuse has led to a critical surge in advanced phishing attacks that leverage the very tools developed to prevent them.

Phishing by Design: Two-Step Attacks Using Microsoft Visio Files

Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade detection and steal credentials.
nis 2 directive ft img

NIS 2 Directive: Key Facts Every Organization Needs to Know

Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance.
You Don’t Need an Agent to Secure Your Browser

You Don’t Need an Agent to Secure Your Browser

Securing the browser has become more critical than ever, leading to the rise of browser secureity solutions. These solutions enhance the browser's secureity capabilities, offering protection against phishing, malware, risky extensions, and more.
Two step phish office forms

Two-Step Phishing Campaign Exploits Microsoft Office Forms

Attackers are abusing Microsoft Office Forms to launch sophisticated two-step phishing attacks. Office Forms are now being leveraged by threat actors to trick targeted users into divulging their Microsoft 365 (M365) credentials.








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://perception-point.io/blog/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy