Blog

Blog

Abstract overhead
Threat Insight
The Proofpoint Threat Research Team
Access granted: phishing with device code authorization for account takeover
arrows and shield
Email and Cloud Threats
Monica Gupta
Cybersecurity stop of the month: the inbox avalanche—how subscription bombing hides the real attack 
Proofpoint cybersecurity for healthcare
Email and Cloud Threats
Marie Martin
Mental health provider chooses Proofpoint over Abnormal to enhance Microsoft email security