Proofpoint security researchers show that it takes a “fish” to catch a phish.
Proofpoint research shows March Madness brand abuse of social media can yield fans and favorites for bad actors.
Macro malware adds evasion technique and extends the cat and mouse game between malware writers and detection tools.
Proofpoint research suggests a correlation between social media cheerleading and NCAA basketball tournament success.
Proofpoint security researchers recently analyzed a Dridex email campaign that demonstrates the adoption of sophisticated sandbox evasion techniques by malicious macros.
As the use of cloud-based documents becomes more and more widespread, phishing campaigners have also been leveraging this behavior as a lure for their messages to the benefit of their effectiveness.
As part of its risk intelligence and research practices, Proofpoint Nexgate recently analyzed data on social media accounts of ten of the top UK FTSE 100 brands, and found that the risks and threat activity for UK enterprise brands are trending higher.
Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks
Like the farming practice of using fish remains as fertilizer, modern attackers are using phishing emails to attempt to improve the yields of their pharming campaigns.
This week, Proofpoint security researchers detected what appears to be a new Dridex botnet with some unique behavior.
The December 2014 Proofpoint Threat Report gives us an opportunity to highlight and examine some noteworthy trends that emerged in the email threat landscape last year.