Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
June 08, 2018

TA505 shifts with the times

Proofpoint Staff

Proofpoint researchers provide an update on substantial changes in the TTPs of one of the most prolific actors we track.

May 31, 2018

DanaBot - A new banking Trojan surfaces Down Under

Proofpoint Staff

Proofpoint researchers analyze a new banking Trojan that recently appeared in the wild.

May 30, 2018

Thief in the night: New Nocturnal Stealer grabs data on the cheap

Proofpoint Staff

Proofpoint researchers describe a previously undocumented stealer.

May 30, 2018

Proofpoint Threat Report: Banking Trojans dominate the malware landscape in the first months of 2018

Proofpoint Staff

Proofpoint researchers provide a snapshot and analysis of the changing threat landscape in the first quarter of this year.

May 24, 2018

Phorpiex – A decade of spamming from the shadows

Proofpoint Staff

Proofpoint researchers detail how the Phorpiex/Trik botnet operates and sends spam for a range of actors. 

May 23, 2018

Money for nothing? Cryptocurrency “giveaways” net thousands for scammers

Proofpoint Staff

Proofpoint researchers detail a new trend in cryptocurrency giveaway scams

May 18, 2018

Brain Food botnet gives website operators heartburn

Andrew Conway

Proofpoint researchers detail the purpose, function, and propagation of the Brain Food botnet. 

May 10, 2018

New Vega Stealer shines brightly in targeted campaign

Proofpoint Staff

Proofpoint researchers describe a new information stealer distributed in a campaign with unusual targeting.

April 16, 2018

Threat actors follow the money: Proofpoint releases the Human Factor 2018 Report

Proofpoint Staff

Proofpoint researchers detail trends shaping the threat landscape in email, social media, SaaS applications, and more.

April 12, 2018

EITest: Sinkholing the oldest infection chain

Kafeine

Proofpoint researchers detail the evolution of the EITest infection chain and help sinkhole the long-running operation.

Pages

Stay Connected
TWITTER @THREATINSIGHT