Cybersecurity

Threat Insight

Cybersecurity research and commentary on malware, user actions, and other threats to information security
May 30, 2018

Thief in the night: New Nocturnal Stealer grabs data on the cheap

Proofpoint Staff

Proofpoint researchers describe a previously undocumented stealer.

May 30, 2018

Proofpoint Threat Report: Banking Trojans dominate the malware landscape in the first months of 2018

Proofpoint Staff

Proofpoint researchers provide a snapshot and analysis of the changing threat landscape in the first quarter of this year.

May 24, 2018

Phorpiex – A decade of spamming from the shadows

Proofpoint Staff

Proofpoint researchers detail how the Phorpiex/Trik botnet operates and sends spam for a range of actors. 

May 23, 2018

Money for nothing? Cryptocurrency “giveaways” net thousands for scammers

Proofpoint Staff

Proofpoint researchers detail a new trend in cryptocurrency giveaway scams

May 18, 2018

Brain Food botnet gives website operators heartburn

Andrew Conway

Proofpoint researchers detail the purpose, function, and propagation of the Brain Food botnet. 

May 10, 2018

New Vega Stealer shines brightly in targeted campaign

Proofpoint Staff

Proofpoint researchers describe a new information stealer distributed in a campaign with unusual targeting.

April 16, 2018

Threat actors follow the money: Proofpoint releases the Human Factor 2018 Report

Proofpoint Staff

Proofpoint researchers detail trends shaping the threat landscape in email, social media, SaaS applications, and more.

April 12, 2018

EITest: Sinkholing the oldest infection chain

Kafeine

Proofpoint researchers detail the evolution of the EITest infection chain and help sinkhole the long-running operation.

April 04, 2018

Bitcoin-related domain registrations rise and fall with the cryptocurrency’s value

Proofpoint Staff

Proofpoint researchers detail how actors are creating Bitcoin-related domains that may be used for typo-squatting attacks and fraud.

March 30, 2018

Sandiflux: Another Fast Flux infrastructure used in malware distribution emerges

Kafeine

Proofpoint researchers studied a previously undocumented botnet providing Fast Flux infrastructure for cybercrime.

Pages

Stay Connected
TWITTER @THREATINSIGHT