Changes in phishing lure templates demonstrate cybercriminals’ ability to rapidly change tactics in order to exploit ‘the human factor.’
The Sundown exploit kit is a recent addition to the field of EKs, and Proofpoint researchers have now detected it distributing a new remote access Trojan (RAT).
Dridex actors are taking their malicious macro campaigns abroad.
Why are malicious macro email campaigns so popular with cybercriminals? Proofpoint researchers examine underground forums to find out.
Changes in success tracking enable Dridex threat actors to assess not only technical efficacy, but also demonstrate ROI for their malware innovations.
What does “automation” mean in the context of incident response? This week, Proofpoint security researchers discuss the meaning and best practices for automating incident response.
In a clever attack that combines the phishing and social engineering, cybercriminals use a popular job search site to infiltrate their targets.
In The Human Factor report for 2015, Proofpoint threat researchers analyze the templates and techniques cybercriminals used to help ensure that every organization continued to click.
As the April 15 filing deadline draws near, Proofpoint researchers have seen attackers shift their lures from IRS-themed communications to tax-filing tool lures with a fraud-prevention theme.
Proofpoint Nexgate researchers continue their analysis of social media accounts of the NCAA Men’s Final Four® teams during the final weeks of the tournament.