What does “automation” mean in the context of incident response? This week, Proofpoint security researchers discuss the meaning and best practices for automating incident response.
In a clever attack that combines the phishing and social engineering, cybercriminals use a popular job search site to infiltrate their targets.
In The Human Factor report for 2015, Proofpoint threat researchers analyze the templates and techniques cybercriminals used to help ensure that every organization continued to click.
As the April 15 filing deadline draws near, Proofpoint researchers have seen attackers shift their lures from IRS-themed communications to tax-filing tool lures with a fraud-prevention theme.
Proofpoint Nexgate researchers continue their analysis of social media accounts of the NCAA Men’s Final Four® teams during the final weeks of the tournament.
Proofpoint security researchers show that it takes a “fish” to catch a phish.
Proofpoint research shows March Madness brand abuse of social media can yield fans and favorites for bad actors.
Macro malware adds evasion technique and extends the cat and mouse game between malware writers and detection tools.
Proofpoint research suggests a correlation between social media cheerleading and NCAA basketball tournament success.
Proofpoint security researchers recently analyzed a Dridex email campaign that demonstrates the adoption of sophisticated sandbox evasion techniques by malicious macros.