Stealthy sLoad Downloader Performs Extensive Reconnaissance to Improve Quality of Infected Hosts
Oct25

Stealthy sLoad Downloader Performs Extensive Reconnaissance to Improve Quality of Infected Hosts

A new PowerShell downloader has been discovered – the sLoad downloader – which is being used in stealthy, highly targeted attacks in the United Kingdom and Italy. The sLoad downloader performs a wide range of checks to find out a great deal of information about the system on which it resides, before choosing the most appropriate malicious payload to deploy – if a payload is deployed at all. The sLoad downloader was first identified in...

Read More
Proofpoint Launches Closed-Loop Email Analysis and Response (CLEAR) Solution
Sep12

Proofpoint Launches Closed-Loop Email Analysis and Response (CLEAR) Solution

The Sunnyvale, CA-based cybersecurity firm Proofpoint has announced it has launched a new Closed-Loop Email Analysis and Response (CLEAR) solution that can significantly reduce the time it takes to triage email-based threats. The solution uses a complete closed-loop approach to automatically analyze suspicious emails reported by end users to security teams, identify real threats from false positives, and help security teams remediate...

Read More
Proofpoint Essentials Named Best SME Security Solution at SC Media Europe Awards
Jun14

Proofpoint Essentials Named Best SME Security Solution at SC Media Europe Awards

Proofpoint has been crowned winner of a prestigious SC Media Europe Award at the June 5, 2018 ceremony at the Marriott Grosvenor Square, London. The Sunnyvale, CA-based next generation security and compliance firm won the Best SME Security Solution for Proofpoint Essentials. Proofpoint Essentials is an enterprise-class cybersecurity solution for small and medium sized businesses that incorporates data loss prevention, policy-enforced...

Read More
Proofpoint Incorporates Return Path’s DMARC-Based Anti-BEC Solution into Email
Aug25

Proofpoint Incorporates Return Path’s DMARC-Based Anti-BEC Solution into Email

Return Path’s Email Fraud Protection business unit has been acquired by Proofpoint and its technology will be incorporated into Proofpoint’s range of email security products to offer even greater protection against business email compromise (BEC) attacks. BEC attacks typically impersonate the CEO or CFO and target employees in the payroll and HR departments. The attackers attempt to obtain sensitive information by deception or fool...

Read More
Proofpoint Collects Two SC Media Europe Awards for Fraud Prevention and Email Security
Jun14

Proofpoint Collects Two SC Media Europe Awards for Fraud Prevention and Email Security

Sunnyvale, CA-based next generation security firm Proofpoint collected two prestigious awards as the 2017 SC Media Europe Awards ceremony at Old Billingsgate, London on June 6, 2018. The SC Media Europe Awards are highly coveted by firms in the information security industry. The SC Media Awards recognize the achievements of cybersecurity firms and outstanding products and services across a range of different information technology...

Read More
Proofpoint Report Shows BEC Attacks Have Increased by 45% in the Past 3 Months
Mar26

Proofpoint Report Shows BEC Attacks Have Increased by 45% in the Past 3 Months

There has been a 45% increase in BEC attacks in the past 3 months, according to a new analysis by cybersecurity firm Proofpoint. Not only are BEC attacks now occurring much more frequently, the sophistication of the attacks is also increasing. The analysis was conducted on 5,000 of its enterprise customers over the past three months. 75% of its customers had experienced at least one BEC attempt in the first three months of 2016. Two...

Read More
Proofpoint Adds Dynamic Fraud Prevention to Email Protection Solution
Apr15

Proofpoint Adds Dynamic Fraud Prevention to Email Protection Solution

Proofpoint has announced it has added new functionality to the Proofpoint Email Protection solution to help businesses detect and block email spoofing attacks that attempt to fool employees into disclosing confidential information. While there are many forms of email attacks, spoofing attacks are among the most successful. Cybercriminals impersonate known individuals –colleagues, contacts and trusted companies – to increase the...

Read More