This article originally appeared in Forbes
Observers might be tempted to conclude that the abrupt drop in exploit kit activity in June means a diminished threat from drive-by malvertising attacks.
It’s nothing new that attackers and scammers use popular events and national or regional crisis situations as lures to get victims to fall for their schemes. Tactics range from obtaining money as a fake charity, credential phishing or even malware downloads if victims click on the URL.
The Rio 2016 Summer Olympic Games are right around the corner. From the lighting of the torch to the closing ceremonies, excited fans will be engaging on social media from August 5 to August 21.
Fraudsters create fake social media accounts for many reasons. They may want to use your brand’s popularity to distribute malware, ads, pornography, or hate speech. Alternatively, they might want to protest or embarrass your brand.
Staying ahead of cybercriminals requires two key elements: best-of-breed technology and intelligence that keeps pace with the threat landscape. Proofpoint is committed to helping our customers protect their employees, the information they create, and their brands.
Financial services firms face some the world’s most stringent and complex regulatory pressures. Now they face another challenge: controlling soaring compliance costs.
The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.
According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.