Fraudsters create fake social media accounts for many reasons. They may want to use your brand’s popularity to distribute malware, ads, pornography, or hate speech. Alternatively, they might want to protest or embarrass your brand.
Staying ahead of cybercriminals requires two key elements: best-of-breed technology and intelligence that keeps pace with the threat landscape. Proofpoint is committed to helping our customers protect their employees, the information they create, and their brands.
Financial services firms face some the world’s most stringent and complex regulatory pressures. Now they face another challenge: controlling soaring compliance costs.
The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.
According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.
New types of ransomware continue to emerge, and cybercriminals show no signs of slowing down. We recently discovered four new ransomware variants, including CryptXXX, which is strongly linked to both a sophisticated threat actor and to Angler, the world’s biggest exploit kit by volume.
More than 500 Proofpoint employees work and live in Silicon Valley—and we are dedicated to helping our community year-round.
Impostor emails continue to hit a wide range of businesses around the world, and they don’t show any signs of slowing. According to reports, one unidentified U.S. company lost nearly $100 Million as a result.
Proofpoint security researchers recently discovered a new exploit in the Magnitude exploit kit, and working with fellow researchers in the security community, determined that it targeted a previously unrep