The rapid rise of impostor email, or business email compromise (BEC), has caught some organizations by surprise. Just this week the FBI issued its annual Internet Crime Report, which included a section on this rapidly escalating situation.
According to a recent BakerHostetler Data Security Incident Response Report, it takes an average of seven days for security teams to contain threats once discovered. That’s seven days where critical data is leaving an organization and threats are spreading.
New types of ransomware continue to emerge, and cybercriminals show no signs of slowing down. We recently discovered four new ransomware variants, including CryptXXX, which is strongly linked to both a sophisticated threat actor and to Angler, the world’s biggest exploit kit by volume.
More than 500 Proofpoint employees work and live in Silicon Valley—and we are dedicated to helping our community year-round.
Impostor emails continue to hit a wide range of businesses around the world, and they don’t show any signs of slowing. According to reports, one unidentified U.S. company lost nearly $100 Million as a result.
Proofpoint security researchers recently discovered a new exploit in the Magnitude exploit kit, and working with fellow researchers in the security community, determined that it targeted a previously unrep
Instagram continues to increase in popularity and unfortunately cyber criminals have caught on. A recent Instagram attack has highlighted an important phenomenon—the blending of social media and email attacks.
The Latest Trend Or Natural Evolution?
Next week is the annual RSA Conference, and the cybersecurity community will be coming together to discuss how we can keep organizations safe from the latest cyber crime efforts.
This week we uncovered a new form of ransomware malware (Locky), which infects organizations and holds data hostage until a ransom is paid.