The Rio 2016 Summer Olympic Games are right around the corner. From the lighting of the torch to the closing ceremonies, excited fans will be engaging on social media from August 5 to August 21.
Fraudsters create fake social media accounts for many reasons. They may want to use your brand’s popularity to distribute malware, ads, pornography, or hate speech. Alternatively, they might want to protest or embarrass your brand.
Staying ahead of cybercriminals requires two key elements: best-of-breed technology and intelligence that keeps pace with the threat landscape. Proofpoint is committed to helping our customers protect their employees, the information they create, and their brands.
Financial services firms face some the world’s most stringent and complex regulatory pressures. Now they face another challenge: controlling soaring compliance costs.
The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.
According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.
New types of ransomware continue to emerge, and cybercriminals show no signs of slowing down. We recently discovered four new ransomware variants, including CryptXXX, which is strongly linked to both a sophisticated threat actor and to Angler, the world’s biggest exploit kit by volume.
More than 500 Proofpoint employees work and live in Silicon Valley—and we are dedicated to helping our community year-round.
Impostor emails continue to hit a wide range of businesses around the world, and they don’t show any signs of slowing. According to reports, one unidentified U.S. company lost nearly $100 Million as a result.