A growing class of phishing kits – transparent reverse proxy kits – are being used to get past multi-factor authentication using MiTM tactics. More and more phishing kits are focusing on bypassing ...
E-mail security vendor Proofpoint is upgrading the core of its gateway software and appliance with additional spam and directory harvest-attack prevention, and is adding a module to help catch viruses ...
Staff at organisations involved in the efforts to aid refugees from the conflict in Ukraine have been targeted by what security researchers describe as a likely state-sponsored phishing campaign that ...
Cybersecurity leader reduces threat triage time of end user-reported malicious emails from days to minutes SUNNYVALE, Calif., Sept. 05, 2018 (GLOBE NEWSWIRE) -- Proofpoint, Inc., (NASDAQ: PFPT), a ...
Proofpoint announced Monday the availability of Proofpoint Protection Server 2.5, a new version of the company’s messaging security system, and the P1000 appliance, a hardware alternative that can ...
An unknown and likely advanced threat actor is using a novel combination of open source tools, steganography, and a detection bypass technique to attack government agencies, real estate companies, and ...
The new Proofpoint Shield, which is being sold exclusively through channel partners, reduces inbound e-mail volumes by as much as 90 percent and eliminates the need for businesses to continually buy ...
Enterprise organizations appear to be falling even further behind in their battle against phishing threats despite heightened awareness of the problem and efforts to curb it. A new study shows that in ...
Hackers are using AI-powered website builders to quickly craft phishing sites Thousands of organizations have already been targeted Lovable is introduction different protections to combat the threat ...
Anti-spam startup Proofpoint on Monday emerged from stealth mode backed by $7 million in venture capital and a big name from the Netscape era: Eric Hahn. Hahn brings his messaging background to ...
While spam continues to be a problem, consuming network bandwidth and users’ time, it is not the only security issue facing e-mail administrators. DHAs (directory harvest attacks) try to find valid ...