Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
April 29, 2015

Foot in the door: Cybercriminals leverage job search website to sneak malware into businesses

Proofpoint Staff

In a clever attack that combines the phishing and social engineering, cybercriminals use a popular job search site to infiltrate their targets.

April 22, 2015

The Human Factor 2015: Attackers drive business end-user clicks

In The Human Factor report for 2015, Proofpoint threat researchers analyze the templates and techniques cybercriminals used to help ensure that every organization continued to click. 

April 15, 2015

Fraud Feeds Phishing in Tax-themed Email Campaign

Proofpoint Staff

As the April 15 filing deadline draws near, Proofpoint researchers have seen attackers shift their lures from IRS-themed communications to tax-filing tool lures with a fraud-prevention theme.

April 09, 2015

Social Media Swishes and Fouls in the Final Four®

Proofpoint Staff

Proofpoint Nexgate researchers continue their analysis of social media accounts of the NCAA Men’s Final Four® teams during the final weeks of the tournament.

April 01, 2015

It Takes a Fish to Catch a Phish

Proofpoint security researchers show that it takes a “fish” to catch a phish.

March 25, 2015

Social Media and March Madness: Predictive or Problematic?

Proofpoint research shows March Madness brand abuse of social media can yield fans and favorites for bad actors.

March 19, 2015

Run-on-Close Macros Try to Shut the Door on Sandboxes

Proofpoint Staff

Macro malware adds evasion technique and extends the cat and mouse game between malware writers and detection tools.

March 12, 2015

Make some (social media) noise!

Proofpoint Staff

Proofpoint research suggests a correlation between social media cheerleading and NCAA basketball tournament success.

March 11, 2015

There’s a Macro in your Sandbox

Proofpoint Staff

Proofpoint security researchers recently analyzed a Dridex email campaign that demonstrates the adoption of sophisticated sandbox evasion techniques by malicious macros.

March 05, 2015

What attachments?: Credential phishing with cloud-based documents

Proofpoint Staff

As the use of cloud-based documents becomes more and more widespread, phishing campaigners have also been leveraging this behavior as a lure for their messages to the benefit of their effectiveness.

Pages

Stay Connected
TWITTER @THREATINSIGHT