The Double-Edged Sword of Cyber Espionage

State-sponsored attacks are alarming and difficult to prevent, but they suffer from a fundamental weakness that can be leveraged by defenders. This article has been indexed from Dark Reading Read the original article: The Double-Edged Sword of Cyber Espionage

Dangers of Deep Sea Phishing

By Michael Angelo Zummo, Threat Intel Expert – CybersixgillPhishing tools and services are common and accessible on the underground. We took a close look at one of them and discovered how easy it can be to launch a phishing scheme.…

BEC Attack Roundup: Thread Hijack Edition

In this blog we look at real-life examples of thread hijacks, caught by our Advanced Threat Prevention platform before they could cost our customers millions. The post BEC Attack Roundup: Thread Hijack Edition appeared first on Perception Point. This article…

Patch Management Policy: A Practical Guide

Patching, a highly necessary, yet sometimes neglected practice of resolving security risks related to vulnerabilities, can prove difficult for organizations of all sizes. You probably already know that a regular and well-defined patch management routine proactively ensures your systems function…