Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
February 26, 2015

Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks

Proofpoint Staff

Like the farming practice of using fish remains as fertilizer, modern attackers are using phishing emails to attempt to improve the yields of their pharming campaigns.

February 20, 2015

“LogIn waz here”: A new Dridex botnet takes a different path

Proofpoint Staff

This week, Proofpoint security researchers detected what appears to be a new Dridex botnet with some unique behavior.

February 11, 2015

Looking Back at 2014: A Little Good, A Lot of Bad

Proofpoint Staff

The December 2014 Proofpoint Threat Report gives us an opportunity to highlight and examine some noteworthy trends that emerged in the email threat landscape last year.

February 10, 2015

Looking for Love in All the Wrong Places

Proofpoint Staff

Social media data scams can lead victims to look for love in the wrong places.

February 05, 2015

Dyre Straits: Evolution of the Dyre Banking Trojan Challenges Traditional Defenses

Proofpoint Staff

The sudden and rapid evolution of Dyre to incorporate evasion techniques often associated with more sophisticated, targeted threats highlights a central challenge of today’s threat landscape.

January 29, 2015

Social Media and Brand Risk: Sometimes You Play the Game, Sometimes the Game Plays You

Proofpoint Staff

Social media is a whole new ballgame for cybersecurity, and most businesses have yet to organize their defense for this new challenge.

January 27, 2015

Tax Return Malware Attacks – Hidden Penalty, Early Withdrawal

Proofpoint Staff

April 15 is still months away, but phishers are already filing their campaigns in hopes of an early return. 

January 22, 2015

Now What? Why We Should Talk About Incident Response

Proofpoint Staff

Information security often focuses on the "cool" exploit and detection side of cyber-defense, but the importance of incident response is gaining attention.

January 14, 2015

In Russia, the Phish Spear You

Proofpoint Staff

Spearfishing and spear-phishing may be homonyms, but they have vastly different meanings and apply in very different contexts. Spearfishing is a form of fishing in which the fisherman attempts to impale a fish upon a spear, which can be thr

December 23, 2014

New Dridex Botnet Drives Massive Surge in Malicious Attachments

Kimberly

The Dridex banking Trojan is already well-known and documented in analyses by security researchers from Proofpoint and other organizations.

Pages

Stay Connected
TWITTER @THREATINSIGHT