Proofpoint

Proofpoint Threat Protection Platform enhancements protect users from BEC and supply chain attacks
Proofpoint announced an array of new innovations across its Threat Protection Platform, enabling organizations to combat today’s most advanced and prevalent threats such as …

Board members should make CISOs their strategic partners
Proofpoint released their Cybersecurity: The 2022 Board Perspective report, which explores board of directors’ perceptions about their key challenges and risks. Cybersecurity …

Westcon-Comstor signs EMEA distribution agreement with Proofpoint
Westcon-Comstor has signed a new distribution agreement with Proofpoint to extend the reach of Proofpoint’s cybersecurity and compliance solutions in the EMEA market. The …

Companies struggle to govern their new cloud environments
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

Universities are at risk of email-based impersonation attacks
Proofpoint released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, …

Attackers are slowly abandoning malicious macros
Malicious macro-enabled documents as vehicles for email-based malware delivery are being used less and less, Proofpoint researchers have noticed. Threat actors are switching …

Cyber criminals continue to target and exploit people
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — …

Qbot – known channel for ransomware – delivered via phishing and Follina exploit
More than a week has passed since Microsoft acknowledged the existence of the “Follina” vulnerability (CVE-2022-30190), after reports of it being exploited in the …
How CISOs are adjusting in the wake of two years of pandemic disruption
Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers. While the world’s CISOs spent 2021 coming to …

How confident are CISOs about their security posture?
Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 …

Attackers employ novel methods to backdoor French organizations
An advanced threat actor has been spotted using distinctive, novel methods to backdoor French entities in the construction, real estate, and government industries. How the …