Proofpoint researchers look ahead at the changing threat landscape and the increasing tendency for threat actors to target people rather than chase the latest exploits.
Proofpoint researchers track the latest trends in malware and online threats for the first quarter of the year.
In this blog we describe one of these large-scale attacks and outline best practices for mitigation with DMARC (Domain-based Authentication Reporting and Conformance), a technology that is highly effective but which must be implemented correctly to avoid unintended problems and time-consuming maintenance.
Proofpoint researchers discover a new ransomware variant with polished ransom pages and convincing lures.
Proofpoint researchers analyze the capabilities and data flow of a new PayPal phishing kit.
Proofpoint researchers provide background on EITest activity and explore a newly added Chrome case of the EITest infection chain
Proofpoint researchers track a targeted keylogger campaign using embedded Visual Basic objects and a fake Silverlight update lure.
No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers track a threat actor group using a new malware and malicious emails to infect victims with banking Trojans and POS malware.
Proofpoint researchers identify a new information stealer that can grab messenger and FTP credentials, cryptocurrency wallets, and other data while evading detection.