In what has become an all-too-familiar story, a ransomware attack unfortunately hit a healthcare provider in Indiana. Below are the attack details and four ransomware recommendations to help your organization prepare.
As we begin a new year, it’s time to make sure your organization is prepared to protect itself against the latest digital and social media threats. Do you know what to watch out for? Are you ready for a social media hack? Do you have a plan?
At this time last year, Proofpoint’s threat intelligence team was seeing sustained malvertising campaigns distributing a variety of exploit kits, big increases in email campaigns carrying ransomware payloads, and a huge jump in attacks via social media and mobile devices.
In October 2017, the Department of Homeland Security announced Binding Operational Directive (BOD) 18-01 to increase security for people who receive email from federal agencies or visit a federal website.
Proofpoint researchers discover a new means of exploiting Google Apps Script to deliver malware via URLs.
Organizations are these days tasked with an increasingly complex set of priorities amid a digital transformation that is changing the way people work. However, they still must capture and archive business records and make them discoverable.
On 25 May 2018, the General Data Protection Regulation (GDPR) will come into effect globally. The new regulation is designed to strengthen and unify data protection for everyone within the European Union (EU).
Foreign IPs Spoofing U.S. Government Email Domains Underscore Urgency of DHS Directive on Authentication
Those of us with a strong interest in restoring trust to the email ecosystem received some great news last month, as the US Department of Homeland Security issued a directive (BOD 18-01) mandating that federal agencies authenticate their email to eliminate spo
Email fraud, or business email compromise, is a growing threat that impacts organizations of all shapes and sizes. These highly targeted email attacks that spoof trusted executives or partners, often don’t include a payload - such