Proofpoint threat analysts show how the backscatter from bounced phishing messages can alert ab organization that their brand is being misused to carry out credential phishing.
Proofpoint researchers analyze a large, single-day campaign that used LNK attachments to deliver the Dridex banking Trojan.
Phishing campaigns use document attachments and malicious macros to target French banking customers.
Changes in phishing lure templates demonstrate cybercriminals’ ability to rapidly change tactics in order to exploit ‘the human factor.’
The Sundown exploit kit is a recent addition to the field of EKs, and Proofpoint researchers have now detected it distributing a new remote access Trojan (RAT).
Dridex actors are taking their malicious macro campaigns abroad.
Why are malicious macro email campaigns so popular with cybercriminals? Proofpoint researchers examine underground forums to find out.
Changes in success tracking enable Dridex threat actors to assess not only technical efficacy, but also demonstrate ROI for their malware innovations.
What does “automation” mean in the context of incident response? This week, Proofpoint security researchers discuss the meaning and best practices for automating incident response.
In a clever attack that combines the phishing and social engineering, cybercriminals use a popular job search site to infiltrate their targets.