Blog

Blog

phishing
Email and Cloud Threats
Paul Chavez
From initial access to post-compromise abuse: what our latest ATO analysis reveals
Connect people
Email and Cloud Threats
Jenny Chen
Stuck on Mimecast? Why one automotive enterprise added Proofpoint’s API protection behind its gateway
Threat actor hood
Threat Insight
The Proofpoint Threat Research Team
(Don't) TrustConnect: It's a RAT in an RMM hat