Proofpoint researchers track versions of the Retefe banking Trojan that use the now infamous EternalBlue exploit to move within networks after initial infections.
As with other recent high-profile elections, Proofpoint researchers have observed a direct correlation among spam volumes, major events, and opinion polls in the German national election.
Proofpoint researchers track a new campaign by a Chinese APT actor using the promise of leaked Game of Thrones content in lures delivering a well-known RAT.
Proofpoint researchers detail a new ransomware strain called Defray after it is used in small, targeted attacks on healthcare, education, and manufacturing organizations.
Proofpoint researchers detail new droppers and updated functionality in what appears to be a G20-targeted attack by the Turla APT actor.
Proofpoint researchers track a number of Chrome extensions compromised for stealing credentials and hijacking web traffic.
Proofpoint researchers track the trends that shaped the threat landscape in the second quarter of 2017.
Proofpoint researchers track changes to macros and a new Jscript backdoor being used by the FIN7 threat actor.
Proofpoint researchers track XKey keylogger malware distributed via typosquatted clones of the Litecoin cryptocurrency website and backdoored versions of the app.
Since at least 2011  , information security researchers have attempted to raise awareness about the ease with which attackers could create seemingly legitimate apps and then trick users into granting them access to email and cloud service accounts.