Perception Point’s researchers have uncovered a new type of two-step phishing attack leveraging Microsoft Visio files (.vsdx) and SharePoint. These attacks embed malicious URLs in .vsdx format files to evade detection and steal credentials. This article has been indexed from…
Category: Perception Point
Evasive ZIP Concatenation: Trojan Targets Windows Users
Threat actors continually seek innovative methods to evade detection, and ZIP file concatenation has proven to be an effective tactic. By exploiting the different ways ZIP readers and archive managers process concatenated ZIP files, attackers can embed malware that specifically…
You’re Invited: Rampant Phishing Abuses Eventbrite
In a new Eventbrite phishing campaign, threat actors misuse Eventbrite’s services to steal financial or personal information. This article has been indexed from Perception Point Read the original article: You’re Invited: Rampant Phishing Abuses Eventbrite
NIS 2 Directive: Key Facts Every Organization Needs to Know
Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance. This article has been indexed from Perception Point Read the original…
NIS 2 Directive: Key Facts Every Organization Needs to Know
Discover how the NIS 2 Directive will impact businesses across the EU, with stricter reporting requirements, expanded scope, and significant penalties. Learn how Perception Point helps organizations ensure compliance. This article has been indexed from Perception Point Read the original…
You Don’t Need an Agent to Secure Your Browser
Securing the browser has become more critical than ever, leading to the rise of browser security solutions. These solutions enhance the browser’s security capabilities, offering protection against phishing, malware, risky extensions, and more. The post You Don’t Need an Agent…
Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse
In a new quishing campaign discovered by Perception Point’s security research team, threat actors took QR code phishing to a whole new level. The post Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse appeared first on…
From Threats to Trends: Highlights from Perception Point’s H1 2024 Report
Cybersecurity is a constant cat-and-mouse game, with threat actors always refining their tactics to create more sophisticated and complex attacks, pushing defenses to evolve (ideally) even more quickly. The post From Threats to Trends: Highlights from Perception Point’s H1 2024…
Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing
In recent months, threat actors have discovered a troubling new method to exploit URL rewriting, a feature intended to protect users by replacing links in emails. By manipulating these rewritten URLs, attackers mask highly evasive phishing links behind trusted domains…
Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies
Perception Point researchers discover new InfoStealer malware campaign targeting the hospitality industry. The post Stealing More Than Towels: The New InfoStealer Campaign Hitting Hotels and Travel Agencies appeared first on Perception Point. This article has been indexed from Perception Point…