No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers explore a financial phishing campaign using password-protected attachments, a technique becoming more common in malware campaigns.
Proofpoint researchers track ongoing malvertising campaigns leading to the DNSChanger exploit kit.
Proofpoint researchers track a threat actor group using a new malware and malicious emails to infect victims with banking Trojans and POS malware.
Proofpoint researchers identify a new information stealer that can grab messenger and FTP credentials, cryptocurrency wallets, and other data while evading detection.
Proofpoint researchers track multiple point-of-sale malware variants and seasonal variations in their propagation.
Proofpoint security researchers share their predictions for the top threat landscape trends to watch for in 2017.
Proofpoint researchers track phishing software advertised, distributed (and backdoored) via YouTube.
Proofpoint researchers, in collaboration with colleagues at Morphick, track a new Point-of-Sale malware, just in time for the holiday season.
Proofpoint researchers track a new ransomware variant that gathers data about victims on their Skype, Facebook, and LinkedIn accounts.