On May 3rd, Twitter asked its 336 million users to change their passwords due to an internal bug. The company discovered stored passwords unmasked in an internal log.
Proofpoint is excited to announce early access to Proofpoint Nexus Threat Explorer. Nexus Threat Explorer (NTX) gives customers direct access to the vast corpus of threat intelligence in Proofpoint’s 800B+ node threat graph.
The Problem with Manual Document Review
On May 25, this Friday, the General Data Protection Regulation (GDPR) will take effect.
The healthcare industry is under attack. Ransomware is shutting down emergency rooms, fraudulent emails are defrauding patients, and attackers steal confidential medical data regularly.
Security awareness training helps organizations improve their security posture. Part of that training is enabling the next step after a user recognizes a phishing email—sending the suspicious email to an abuse mailbox. But what happens to an email forwarded to the abuse mailbox?
A company’s executives and offices are focal points for unhappy customers, activist groups, cybercriminals, and disgruntled employees who want to do harm. These risks to your executives and locations are difficult to manage without visibility.
Enterprise cloud adoption shifts the cybersecurity landscape for both attackers and the organizations they target. As data moves to the cloud cyber threats move with it, evolving their targets and priorities.
Why is email fraud—one of the oldest and most commonly known scams, where a fraudster spoofs a trusted identity in an effort to steal money or valuable information—still so pervasive today? You have likely heard of one of these email tricks that seem too unrealistic to be true and thought to your