Proofpoint researchers analyze the capabilities and data flow of a new PayPal phishing kit.
Proofpoint researchers provide background on EITest activity and explore a newly added Chrome case of the EITest infection chain
Proofpoint researchers track a targeted keylogger campaign using embedded Visual Basic objects and a fake Silverlight update lure.
No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers explore a financial phishing campaign using password-protected attachments, a technique becoming more common in malware campaigns.
Proofpoint researchers track ongoing malvertising campaigns leading to the DNSChanger exploit kit.
Proofpoint researchers track a threat actor group using a new malware and malicious emails to infect victims with banking Trojans and POS malware.
Proofpoint researchers identify a new information stealer that can grab messenger and FTP credentials, cryptocurrency wallets, and other data while evading detection.
Proofpoint researchers track multiple point-of-sale malware variants and seasonal variations in their propagation.