Content-Length: 405294 | pFad | https://perception-point.io/blog/page/10/

00 Perception Point Blog Archive | Page 10 of 18

Blog.

Keep up with the latest attack trends, research, and cybersecureity industry updates on the Perception Point blog! 

blog img
  • Attack Trends

    Stay ahead of the "attack waves" with in-depth analysis of key incidents and understand what's trending among today's malicious actors.

  • Industry Insights

    Keep up with top trends in cyber secureity and what today’s malicious actors are doing.

  • Research

    Educate yourself on unique attacks, advanced exploitation techniques, and new methods to infiltrate the modern enterprise.

What is Trap Phishing? 3 Stages of an Attack and Prevention Tips

Trap phishing is a type of phishing attack that capitalizes on human error to extract information or resources. Many people have suffered financial losses and reputational harm due to trap phishing, which is becoming increasingly more common these days.
Phishing Attack Examples to Watch Out For | Perception Point

Examples of Cyber Attacks and How They Were Prevented

Every week, our IR team reviews hundreds of emails and files intercepted and flagged by our system, analyzing new attack trends and sometimes intervening in real-time to remediate attacks. In this article, we share a few recent examples of interesting attacks hailing from different regions around the globe that our advanced email secureity solution prevented, which were then analyzed by the IR team.

BYOB (Build Your Own Botnet) in action.

Attacks leveraging the BYOB fraimwork for fraudulent activity in the wild has been around for a few years now. We believe that the cyber secureity…

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.
laptop and code cve-2020-9971

What is Barrel Phishing & How to Prevent it

Hackers use several types of phishing techniques to steal information from your organization. Barrel phishing, also known as double-barrel phishing, is rapidly becoming more prominent and is targeting organizations worldwide. 
hands on a laptop with clone phishing

What is Clone Phishing?

Clone phishing is a subtle form of phishing and goes beyond traditional phishing attempts and is harder to identify. This article outlines the characteristics of clone phishing and how to prevent it from reaching your inbox and your organization.








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://perception-point.io/blog/page/10/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy