Hi [[ session.user.profile.firstName ]]

Proofpoint

  • Date
  • Rating
  • Views
  • Weekly Threat Byte | Happy (Late) Holidays
    Weekly Threat Byte | Happy (Late) Holidays
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Jan 15 2019 7 mins
    For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

    Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
  • Weekly Threat Byte | Sextortion Malware
    Weekly Threat Byte | Sextortion Malware
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Dec 19 2018 11 mins
    For this week's Interesting Threat Byte, we bring you Sextortion! Sextortion is a category of scams where threat actors claim to have compromising information about the victim and threaten to expose their activities if an extortion payment is not made. We also focus on a recent Sextortion campaign that demanded $381 of Bitcoin.

    Watch the video to learn all about it.
  • Weekly Threat Byte | Get Ready for the Invasion
    Weekly Threat Byte | Get Ready for the Invasion
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Dec 18 2018 9 mins
    . CobInt is a fairly new malware, discovered in early 2018, and seems to only be doing reconnaissance for now. It is a three stage malware with the ability to download additional modules when it's ready to strike. Like the other malwares in this series, CobInt uses clever techniques to disguise and hide itself from security researchers. CobInt is spread by a threat actor sending an email to a victim with a Microsoft Word document containing macros. If the macro is enabled, CobInt is downloaded.
  • Live Demo: Email Protection and Targeted Attack Protection
    Live Demo: Email Protection and Targeted Attack Protection
    Ryan Loo - Sr Systems Engineer Recorded: Dec 13 2018 46 mins
    More than 90% of targeted attacks start with email, and these threats are always evolving.

    Proofpoint helps you stay ahead of these attacks with a people-centric approach that detects, analyzes, and blocks advanced threats before they reach your inbox.

    Join us for a live demo and learn about:

    •How to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Enterprise Archive with Proofpoint - See How it Works
    Enterprise Archive with Proofpoint - See How it Works
    Tom Mahoney - Senior Archive Specialist, Terry McMahon Sr Systems Engineer Recorded: Dec 11 2018 57 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Modern Email Fraud Defense | Live Demo
    Modern Email Fraud Defense | Live Demo
    Fahad Dadabhoy - Sr Sale Engineer, Proofpoint Recorded: Dec 6 2018 40 mins
    Highly targeted email fraud attacks – like a cyber criminal impersonating your CEO to send your CFO a wire transfer request – are hard to catch, unless you have the right tools.

    Join us for a live demo of Proofpoint Email Fraud Defense to see how we catch email fraud scenarios like this and more.

    You’ll see for yourself how to:

    •Block malicious emails spoofing your domains before they reach your employees and customers

    •Monitor all emails (inbound and outbound) from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Weekly Threat Byte | tRAT the Trojan
    Weekly Threat Byte | tRAT the Trojan
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Dec 5 2018 5 mins
    For this week’s Interesting Threat Byte, we bring you tRAT.

    tRAT is a new Remote Access Trojan (RAT) that was first discovered back in September. The first campaigns included fake Norton Security and TripAdvisor brands as lures to get victim's to open the included Microsoft Word document, enabling macros.

    On October 11, 2018, Proofpoint discovered another tRAT campaign, but this time by threat actor TA505.

    Watch the video to get the details on tRAT and TA505.
  • Weekly Threat Byte | Good Advice, Avoid AdvisorsBot
    Weekly Threat Byte | Good Advice, Avoid AdvisorsBot
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Dec 4 2018 11 mins
    For this week’s Interesting Threat Byte, we bring you AdvisorsBot.

    AdvisorsBot, is part of a group of recently discovered downloader malwares. AdvisorsBot is targeting hotels, restaurants, and telecommunications companies and is notable because it is currently only collecting system information, can download other modules/payloads, connects back to command and control servers and has many anti-analysis checks built into the code.

    Watch the video to see how AdvisorBot operates.
  • Phishing Awareness Tools | Wombat demo
    Phishing Awareness Tools | Wombat demo
    Proofpoint Recorded: Dec 4 2018 60 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!
    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Customer Webinar: A people-centric approach to Cloud Security
    Customer Webinar: A people-centric approach to Cloud Security
    Stephen Chan-Sr Director, Product Marketing & Itir Clarke-Sr Product Marketing Manager Recorded: Nov 29 2018 56 mins
    As a Proofpoint customer, you’re already protecting your people from targeted attacks like phishing and malware.

    But what about your data in the cloud?

    Join us for a Proofpoint Customer webinar to learn how you can extend your people-centric email protection to accounts and data in the cloud.

    You’ll learn best practices to:

    •Protect confidential data from theft and loss
    •Secure employees most targeted by threats
    •Integrate threat detection and access controls across email and cloud

Embed in website or blog