Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
August 13, 2015

Proofpoint Threat Report: Top trends of 2015 so far

Proofpoint Staff

Proofpoint review of threat trends for the first six months of 2015 finds that cybercriminals have changed tactics and techniques as they target business users with increasingly malicious campaigns.

August 06, 2015

Dead phish bounce: Alerting to brand risk with email backscatter

Proofpoint Staff

Proofpoint threat analysts show how the backscatter from bounced phishing messages can alert ab organization that their brand is being misused to carry out credential phishing.

July 29, 2015

Dridex Actor Tries New File Format: The Missing LNK

Proofpoint Staff

Proofpoint researchers analyze a large, single-day campaign that used LNK attachments to deliver the Dridex banking Trojan.

July 13, 2015

Fleurs du malware: Phishing campaigns fill their nets in France

Proofpoint Staff

Phishing campaigns use document attachments and malicious macros to target French banking customers. 

July 01, 2015

The Human Factor 2015 Close-up: What are users clicking on?

Proofpoint Staff

Changes in phishing lure templates demonstrate cybercriminals’ ability to rapidly change tactics in order to exploit ‘the human factor.’

June 25, 2015

Sundown EK Spreads LuminosityLink RAT: Light After Dark

Proofpoint Staff

The Sundown exploit kit is a recent addition to the field of EKs, and Proofpoint researchers have now detected it distributing a new remote access Trojan (RAT).       

June 18, 2015

Dridex actor shifts focus to Europe: Not-so-innocents abroad

Proofpoint Staff

Dridex actors are taking their malicious macro campaigns abroad.

June 10, 2015

Malware ROI and the Return of Malicious Macros: It's Not Personal, It's Business

Proofpoint Staff

Why are malicious macro email campaigns so popular with cybercriminals? Proofpoint researchers examine underground forums to find out.

May 21, 2015

When Threat Intelligence Meets Business Intelligence

Proofpoint Staff

Changes in success tracking enable Dridex threat actors to assess not only technical efficacy, but also demonstrate ROI for their malware innovations.

May 13, 2015

Best Practices in Incident Response Automation

Proofpoint Staff

What does “automation” mean in the context of incident response? This week, Proofpoint security researchers discuss the meaning and best practices for automating incident response.

Pages

Stay Connected
TWITTER @THREATINSIGHT