Blog

Blog

<span class="visually-hidden">View Beyond the breach: inside a cargo theft actor’s post-compromise playbook</span>
Zero Trust Networks
Threat Insight
The Proofpoint Threat Research Team
Beyond the breach: inside a cargo theft actor’s post-compromise playbook
<span class="visually-hidden">View Mailbox rules in O365—a post-exploitation tactic in cloud ATO</span>
DMARC-Blog-Banner
Threat Insight
Anna Akselevich, Pavel Asinovsky, and Yaniv Miron
Mailbox rules in O365—a post-exploitation tactic in cloud ATO
<span class="visually-hidden">View Navigating India’s digital personal data protection: a human and AI-centric approach with Proofpoint </span>
Connect city
Information Protection
Jerry Shi
Navigating India’s digital personal data protection: a human and AI-centric approach with Proofpoint