In this blog we describe one of these large-scale attacks and outline best practices for mitigation with DMARC (Domain-based Authentication Reporting and Conformance), a technology that is highly effective but which must be implemented correctly to avoid unintended problems and time-consuming maintenance.
Proofpoint researchers discover a new ransomware variant with polished ransom pages and convincing lures.
Proofpoint researchers look back at the last quarter of 2016 and the full year to understand the shifting threat landscape and provide recommendations for the year to come.
Proofpoint researchers track a variety of recent online threats, ranging from banking Trojans to credential phishing, targeting French interests.
Proofpoint researchers analyze the capabilities and data flow of a new PayPal phishing kit.
Proofpoint researchers provide background on EITest activity and explore a newly added Chrome case of the EITest infection chain
Proofpoint researchers track a targeted keylogger campaign using embedded Visual Basic objects and a fake Silverlight update lure.
No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers explore a financial phishing campaign using password-protected attachments, a technique becoming more common in malware campaigns.