Proofpoint researchers analyze multiple techniques for obfuscating phishing landing pages.
Proofpoint researchers give further insights into recent Vawtrak and UrlZone campaigns in Japan and Spain.
Proofpoint researchers track a new Dridex campaign with an unusual combination of vectors.
Proofpoint researchers find new malware variants and evidence of emerging threats related to the Bergard Trojan through historical analysis and a deep dive into an ongoing campaign.
Proofpoint researchers follow a new Dridex infection chain and explore the expanding distribution mechanisms for the malware juggernaut.
Proofpoint researchers analyze changes to the South Korea-targeted Blackmoon banking Trojan.
Even bad actors take holidays and they aren’t just driven by the work schedules of their targets
Recently, Proofpoint Targeted Attack Protection Mobile Defense discovered apps on iOS devices – that is, iPhones and iPads – that did not match apps in the Apple App Store.
Cybercriminals are increasingly targeting mobile users with free mobile apps in order to steal data – and nothing is sacred. Like a social media account with a large following, popular mobile apps give scammers a low-cost way to cast a very wide net.