Proofpoint research suggests a correlation between social media cheerleading and NCAA basketball tournament success.
Proofpoint security researchers recently analyzed a Dridex email campaign that demonstrates the adoption of sophisticated sandbox evasion techniques by malicious macros.
As the use of cloud-based documents becomes more and more widespread, phishing campaigners have also been leveraging this behavior as a lure for their messages to the benefit of their effectiveness.
As part of its risk intelligence and research practices, Proofpoint Nexgate recently analyzed data on social media accounts of ten of the top UK FTSE 100 brands, and found that the risks and threat activity for UK enterprise brands are trending higher.
Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks
Like the farming practice of using fish remains as fertilizer, modern attackers are using phishing emails to attempt to improve the yields of their pharming campaigns.
This week, Proofpoint security researchers detected what appears to be a new Dridex botnet with some unique behavior.
The December 2014 Proofpoint Threat Report gives us an opportunity to highlight and examine some noteworthy trends that emerged in the email threat landscape last year.
Social media data scams can lead victims to look for love in the wrong places.
The sudden and rapid evolution of Dyre to incorporate evasion techniques often associated with more sophisticated, targeted threats highlights a central challenge of today’s threat landscape.
Social media is a whole new ballgame for cybersecurity, and most businesses have yet to organize their defense for this new challenge.