Proofpoint researchers analyze a previously undocumented stealer called Ovidiy Stealer. Lightweight, efficient, and with attractive pricing and marketing, Ovidiy Stealer makes it easy for would-be criminals to make the leap into credential theft.
Proofpoint researchers examine how the affiliate marketing model drives both spam and malware distribution.
Proofpoint researchers track recent AdGholas activity with colleagues from the advertising and security industries after ransomware activity in the UK set off red flags.
Proofpoint researchers examine phishing templates used to steal cryptocurrencies and related credentials from users.
Proofpoint researchers look ahead at the changing threat landscape and the increasing tendency for threat actors to target people rather than chase the latest exploits.
Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions
Proofpoint researchers track the actor known as Cobalt using Microsoft Word Intruder (MWI) and a well-known vulnerability to target financial institutions.
After multiple election cycles, Proofpoint researchers point to relationships between spam volumes and election outcomes.
“Where are the exploits of yesteryear?” Marking one year since a major EK featured a new unpatched vulnerability
Proofpoint researchers track the effectiveness of exploit kits and the declining availability of unpatched vulnerabilities.
Proofpoint researchers have discovered another massive ongoing attack using EternalBlue/DoublePulsar to spread the cryptocurrency miner Adylkuzz.
Proofpoint researchers analyze new ransomware from the actors who brought us Dridex, Locky, and Bart.