Home Page

Hero Banner

Happening Now

In the News



Choices

SOLUTIONS

Threat Protection

Detect, block, and respond to email and social media-based threats, and harden against data loss

COMPLIANCE

Comply easily and thoroughly with internal security controls as well as external regulatory policies

Discovery

Find information quickly—whether it resides on email, IM, social media, shared drives or SharePoint

Threat Insight Blog

Threat Insight Blog

Cybersecurity research and commentary on malware, user actions, and other threats to information security

Jul 28

Massive AdGholas Malvertising Campaigns Use Steganography and File Whitelisting to Hide in Plain Sight

Posted by Kafeine | 0

Proofpoint and Trend Micro researchers collaborated to detect and analyze a sophisticated, previously undocumented malvertising campaign that exposed millions of users every day to attacks that employed steganography and multi-layered filtering.

26 July 2016

Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan

Posted by | 0

Proofpoint researchers discovered a new delivery mechanism for malware - PayPal money request messages with both a link to Chthonic and a socially engineered request for $100.

Live Demo

Join Us for a Live Demo

Find out how Proofpoint can help your organisation detect, prevent, and respond to threats.