Blog

Threat Insight

<span class="visually-hidden">View Device Code Phishing is an Evolution in Identity Takeover</span>
Cyber Criminal
Threat Insight
Selena Larson, Jake Gionet, Sarah Sabotka and The Proofpoint Threat Research Team
Device Code Phishing is an Evolution in Identity Takeover
<span class="visually-hidden">View Mailbox rules in O365—a post-exploitation tactic in cloud ATO</span>
DMARC-Blog-Banner
Threat Insight
Anna Akselevich, Pavel Asinovsky, and Yaniv Miron
Mailbox rules in O365—a post-exploitation tactic in cloud ATO
<span class="visually-hidden">View I’d come running back to EU again: TA416 resumes European government espionage campaigns</span>
Europe connect
Threat Insight
Mark Kelly, Georgi Mladenov, and the Proofpoint Threat Research Team
I’d come running back to EU again: TA416 resumes European government espionage campaigns