Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI to counter these attacks, according to Perception Point and Osterma… Continue reading Cybercriminals turn to AI to bypass modern email security measures

Perception Point introduces AI model to detect and prevent BEC attacks

Perception Point reveals its latest detection innovation, developed to counter the emergent wave of AI-generated email threats. The AI-powered technology leverages Large Language Models (LLMs) and Deep Learning architecture to effectively detect and pr… Continue reading Perception Point introduces AI model to detect and prevent BEC attacks

Threat actors exploit new channels for advanced phishing attacks

Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of attacks increased by 87%, highlighting the growing threat that cyber attacks now po… Continue reading Threat actors exploit new channels for advanced phishing attacks

Perception Point adds DLP capabilities to detect, prevent, and remediate web threats

Perception Point has added browser-centric Data Loss Prevention (DLP) capabilities to its Advanced Browser Security extension. The Browser Security plugin provides comprehensive security measures and granular controls to safeguard corporate assets from… Continue reading Perception Point adds DLP capabilities to detect, prevent, and remediate web threats

How two-step phishing attacks evade detection and what you can do about it

Phishing attacks have become increasingly prevalent and sophisticated, making it more difficult for individuals to protect themselves from these scams. In this Help Net Security video, Ofek Ronen, Software Engineer at Perception Point, discusses two-st… Continue reading How two-step phishing attacks evade detection and what you can do about it

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous si… Continue reading Threat actors extend attack techniques to new enterprise apps and services

Perception Point Advanced Browser Security detects web browser threats

Perception Point released Perception Point Advanced Browser Security, a new web security solution which adds enterprise-grade security to native Chrome and Edge browsers. Perception Point Advanced Browser Security fuses patented browser security techno… Continue reading Perception Point Advanced Browser Security detects web browser threats

Crypto-related phishing and how to avoid it

In this video for Help Net Security, Michael Aminov, Chief Architect at Perception Point, talks about a recent Binance impersonation attack and, more broadly, the ongoing threat landscape impacting the cryptocurrency industry. Cryptocurrencies aren&#82… Continue reading Crypto-related phishing and how to avoid it

Utilizing biological algorithms to detect cyber attacks

Phishing, a longstanding cyberattack technique through which attackers impersonate others to gain access to confidential information, has become immensely popular as of late, hitting an all-time high in December 2021, with attacks tripling since the pr… Continue reading Utilizing biological algorithms to detect cyber attacks