Proofpoint social media researchers analyze how threat actors leverage hashtags to spread their phishing links and spam without having to go through the work of building a network of followers and friends.
Since at least 2011  , information security researchers have attempted to raise awareness about the ease with which attackers could create seemingly legitimate apps and then trick users into granting them access to email and cloud service accounts.
Proofpoint researchers analyze a previously undocumented stealer called Ovidiy Stealer. Lightweight, efficient, and with attractive pricing and marketing, Ovidiy Stealer makes it easy for would-be criminals to make the leap into credential theft.
Proofpoint researchers examine how the affiliate marketing model drives both spam and malware distribution.
Proofpoint researchers track recent AdGholas activity with colleagues from the advertising and security industries after ransomware activity in the UK set off red flags.
Proofpoint researchers examine phishing templates used to steal cryptocurrencies and related credentials from users.
Proofpoint researchers look ahead at the changing threat landscape and the increasing tendency for threat actors to target people rather than chase the latest exploits.
Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions
Proofpoint researchers track the actor known as Cobalt using Microsoft Word Intruder (MWI) and a well-known vulnerability to target financial institutions.
After multiple election cycles, Proofpoint researchers point to relationships between spam volumes and election outcomes.
“Where are the exploits of yesteryear?” Marking one year since a major EK featured a new unpatched vulnerability
Proofpoint researchers track the effectiveness of exploit kits and the declining availability of unpatched vulnerabilities.