Proofpoint review of threat trends for the first six months of 2015 finds that cybercriminals have changed tactics and techniques as they target business users with increasingly malicious campaigns.
Proofpoint threat analysts show how the backscatter from bounced phishing messages can alert ab organization that their brand is being misused to carry out credential phishing.
Proofpoint researchers analyze a large, single-day campaign that used LNK attachments to deliver the Dridex banking Trojan.
Phishing campaigns use document attachments and malicious macros to target French banking customers.
Changes in phishing lure templates demonstrate cybercriminals’ ability to rapidly change tactics in order to exploit ‘the human factor.’
The Sundown exploit kit is a recent addition to the field of EKs, and Proofpoint researchers have now detected it distributing a new remote access Trojan (RAT).
Dridex actors are taking their malicious macro campaigns abroad.
Why are malicious macro email campaigns so popular with cybercriminals? Proofpoint researchers examine underground forums to find out.
Changes in success tracking enable Dridex threat actors to assess not only technical efficacy, but also demonstrate ROI for their malware innovations.
What does “automation” mean in the context of incident response? This week, Proofpoint security researchers discuss the meaning and best practices for automating incident response.