unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Phishing by Design: Two-Step Attacks Using Microsoft Visio Files
Two-step phishing attacks have become a cornerstone of modern cybercrime, leveraging trusted le...
2024-11-11 17:34:53 | 阅读: 11 |
收藏
|
Perception Point - perception-point.io
phishing
visio
microsoft
leveraging
malicious
Evasive ZIP Concatenation: Trojan Targets Windows Users
Threat actors continually seek innovative methods to evade detection, and ZIP file concatenatio...
2024-11-7 21:44:33 | 阅读: 0 |
收藏
|
Perception Point - perception-point.io
malicious
readers
windows
7zip
You’re Invited: Rampant Phishing Abuses Eventbrite
With over 5 million events annually on Eventbrite, attackers have found a new, trusted entry po...
2024-10-28 23:17:36 | 阅读: 5 |
收藏
|
Perception Point - perception-point.io
eventbrite
phishing
attackers
perception
security
NIS 2 Directive: Key Facts Every Organization Needs to Know
The NIS 2 Directive, set to take effect on October 17th, 2024, represents a significant shift i...
2024-10-15 16:13:2 | 阅读: 3 |
收藏
|
Perception Point - perception-point.io
nis
directive
perception
nis2
You Don’t Need an Agent to Secure Your Browser
In today’s enterprise landscape, securing the browser has become more critical than ever. Tradi...
2024-9-24 21:33:4 | 阅读: 6 |
收藏
|
Perception Point - perception-point.io
security
mainstream
dlp
agents
enhance
Quishing 2.0: QR Code Phishing Evolves with Two-Step Attacks and SharePoint Abuse
Quishing, or QR code phishing, is quickly advancing as threat actors adapt their tactics to byp...
2024-9-23 16:39:32 | 阅读: 10 |
收藏
|
Perception Point - perception-point.io
qr
quishing
security
phishing
perception
From Threats to Trends: Highlights from Perception Point’s H1 2024 Report
In the first half of 2024, the cyber attacks targeting employees increased by 24% per user. Sec...
2024-9-4 20:38:45 | 阅读: 10 |
收藏
|
Perception Point - perception-point.io
phishing
threats
security
accounting
salesforce
Rewriting Hysteria: Rising Abuse of URL Rewriting in Phishing
Threat actors who specialize in phishing are always seeking the most effective methods to deliv...
2024-8-19 17:26:53 | 阅读: 20 |
收藏
|
Perception Point - perception-point.io
rewriting
phishing
security
rewritten
perception
Operation “Uncle Scam”: AI-Powered Phishers Abuse Microsoft Dynamics 365 to Target US Government Contractors
In a phishing campaign dubbed “Uncle Scam,” threat actors impersonate United States government...
2024-8-8 20:38:14 | 阅读: 3 |
收藏
|
Perception Point - perception-point.io
phishing
gsa
llms
attackers
microsoft
Attackers (Crowd)Strike with Infostealer Malware
The infamous Blue(screen) Friday caused widespread concern, commotion, and, for attackers, conv...
2024-7-29 20:30:6 | 阅读: 11 |
收藏
|
Perception Point - perception-point.io
malicious
crowdstrike
windows
evade
infostealer
Two-Step Phishing Campaign Exploits Microsoft Office Forms
Perception Point’s security research team has identified an alarming new phishing campaign. Att...
2024-7-25 21:56:33 | 阅读: 6 |
收藏
|
Perception Point - perception-point.io
microsoft
phishing
malicious
perception
m365
How Perception Point Leads the Charge in Email Security: A Frost & Sullivan Recognition
We are excited to announce that Perception Point has been named a leader in Frost & Sullivan’s...
2024-7-25 20:28:15 | 阅读: 2 |
收藏
|
Perception Point - perception-point.io
security
perception
frost
phishing
sullivan
The Unstoppable Phish: Why Browser-Level Phishing Detection is Essential
Among the myriad of questions I encounter, one frequently stands out: “Why is browser-level phi...
2024-7-23 19:25:37 | 阅读: 4 |
收藏
|
Perception Point - perception-point.io
phishing
malicious
security
threats
gateways
Behind the Attack: Live Chat Phishing
Imagine a world where cybercriminals offer their victims better customer support than your favo...
2024-7-8 21:19:38 | 阅读: 4 |
收藏
|
Perception Point - perception-point.io
phishing
security
victim
perception
attackers
A Deeper Look at Phishing Campaigns Combining URL Component Misuse & Homograph Attacks
Understanding URL ObfuscationURL obfuscation is a tactic cybercriminals use to disguise mal...
2024-6-27 21:49:29 | 阅读: 1 |
收藏
|
Perception Point - perception-point.io
homograph
phishing
security
attackers
malicious
Not-So-Lucky Number 7: A Hacker’s 7 Vendor Email Compromise Attempts
It is no secret that cyber threats are evolving with alarming speed and sophistication. Among t...
2024-6-13 16:56:25 | 阅读: 3 |
收藏
|
Perception Point - perception-point.io
attacker
vec
security
perception
invoice
Adware Extensions: Can They “Break Bad”?
Browser extensions are useful add-ons that enhance productivity and help users accomplish more...
2024-6-6 20:28:15 | 阅读: 2 |
收藏
|
Perception Point - perception-point.io
malicious
security
affiliate
aliexpress
risky
Perception Point and Pax8 Forge Strategic Partnership to Enhance Workspace Security
In today’s digital landscape, where cyber threats lurk in every corner of the internet, securin...
2024-5-21 20:55:11 | 阅读: 2 |
收藏
|
Perception Point - perception-point.io
pax8
perception
threats
Perception Point Recognized as 2023 Strong Performer in Gartner Peer Insights ‘Voice of the Customer’ for Email Security
At Perception Point, we strive to deliver unparalleled email security to our valued customers....
2023-10-4 17:53:5 | 阅读: 6 |
收藏
|
Perception Point - perception-point.io
security
commitment
performer
perception
empowering
Booking.com Customers Hit by Phishing Campaign Delivered Via Compromised Hotels Accounts
A new phishing campaign detected by Perception Point and reported by Akamai is targeting Bookin...
2023-9-27 17:22:59 | 阅读: 9 |
收藏
|
Perception Point - perception-point.io
booking
phishing
hotel
victim
attacker
Previous
-47
-46
-45
-44
-43
-42
-41
-40
Next