Proofpoint researchers provide background on EITest activity and explore a newly added Chrome case of the EITest infection chain
Proofpoint researchers track a targeted keylogger campaign using embedded Visual Basic objects and a fake Silverlight update lure.
No Shortcuts to Verification: Social Media Verification Phishing Scams Steal Credentials and Credit Card Numbers
Proofpoint researchers track a phishing campaign leveraging the concept of "Twitter Brand Verification".
Proofpoint researchers explore a financial phishing campaign using password-protected attachments, a technique becoming more common in malware campaigns.
Proofpoint researchers track ongoing malvertising campaigns leading to the DNSChanger exploit kit.
Proofpoint researchers track a threat actor group using a new malware and malicious emails to infect victims with banking Trojans and POS malware.
Proofpoint researchers identify a new information stealer that can grab messenger and FTP credentials, cryptocurrency wallets, and other data while evading detection.
Proofpoint researchers track multiple point-of-sale malware variants and seasonal variations in their propagation.
Proofpoint security researchers share their predictions for the top threat landscape trends to watch for in 2017.
Proofpoint researchers track phishing software advertised, distributed (and backdoored) via YouTube.