In this blog we describe one of these large-scale attacks and outline best practices for mitigation with DMARC (Domain-based Authentication Reporting and Conformance), a technology that is highly effective but which must be implemented correctly to avoid unintended problems and time-consuming maintenance.
Proofpoint researchers discover a new ransomware variant with polished ransom pages and convincing lures.
Proofpoint researchers analyze the capabilities and data flow of a new PayPal phishing kit.
Proofpoint researchers provide background on EITest activity and explore a newly added Chrome case of the EITest infection chain
Proofpoint researchers track a targeted keylogger campaign using embedded Visual Basic objects and a fake Silverlight update lure.
No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers track a threat actor group using a new malware and malicious emails to infect victims with banking Trojans and POS malware.
Proofpoint researchers identify a new information stealer that can grab messenger and FTP credentials, cryptocurrency wallets, and other data while evading detection.
Proofpoint researchers track multiple point-of-sale malware variants and seasonal variations in their propagation.
Proofpoint security researchers share their predictions for the top threat landscape trends to watch for in 2017.