Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks
Like the farming practice of using fish remains as fertilizer, modern attackers are using phishing emails to attempt to improve the yields of their pharming campaigns.
This week, Proofpoint security researchers detected what appears to be a new Dridex botnet with some unique behavior.
The December 2014 Proofpoint Threat Report gives us an opportunity to highlight and examine some noteworthy trends that emerged in the email threat landscape last year.
Social media data scams can lead victims to look for love in the wrong places.
The sudden and rapid evolution of Dyre to incorporate evasion techniques often associated with more sophisticated, targeted threats highlights a central challenge of today’s threat landscape.
Social media is a whole new ballgame for cybersecurity, and most businesses have yet to organize their defense for this new challenge.
April 15 is still months away, but phishers are already filing their campaigns in hopes of an early return.
Information security often focuses on the "cool" exploit and detection side of cyber-defense, but the importance of incident response is gaining attention.
The Dridex banking Trojan is already well-known and documented in analyses by security researchers from Proofpoint and other organizations.