Proofpoint researchers detail new droppers and updated functionality in what appears to be a G20-targeted attack by the Turla APT actor.
Proofpoint researchers track a number of Chrome extensions compromised for stealing credentials and hijacking web traffic.
Proofpoint researchers track the trends that shaped the threat landscape in the second quarter of 2017.
Proofpoint researchers track changes to macros and a new Jscript backdoor being used by the FIN7 threat actor.
Proofpoint researchers track XKey keylogger malware distributed via typosquatted clones of the Litecoin cryptocurrency website and backdoored versions of the app.
Since at least 2011  , information security researchers have attempted to raise awareness about the ease with which attackers could create seemingly legitimate apps and then trick users into granting them access to email and cloud service accounts.
Proofpoint researchers analyze a previously undocumented stealer called Ovidiy Stealer. Lightweight, efficient, and with attractive pricing and marketing, Ovidiy Stealer makes it easy for would-be criminals to make the leap into credential theft.
Proofpoint researchers examine how the affiliate marketing model drives both spam and malware distribution.
Proofpoint researchers track recent AdGholas activity with colleagues from the advertising and security industries after ransomware activity in the UK set off red flags.
Proofpoint researchers examine phishing templates used to steal cryptocurrencies and related credentials from users.