The return of a malware menace.

The return of a malware menace.

This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, “Bumblebee Buzzes Back in Black.” Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing. After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of…

Read More

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557 with high financial data theft risks and possibly more risks such as intellectual property theft. In this social engineering campaign, the threat actor targets recruiters with benign content before infecting their machines with the More_Eggs malware. This…

Read More

Proofpoint Snags Former VMware President Sumit Dhawan as CEO

Proofpoint Snags Former VMware President Sumit Dhawan as CEO

Dhawan Is Proofpoint’s 3rd CEO Since March 2022; Interim Leader Thomas Back as CFO Michael Novinson (MichaelNovinson) • November 28, 2023     Sumit Dhawan, CEO, Proofpoint Proofpoint has landed top VMware lieutenant Sumit Dhawan as its new chief executive just days after the cloud and virtualization giant was acquired by Broadcom. See Also: Email Reporting and Remediation The Silicon Valley-based email security firm said it liked Dhawan’s track record of building security, cloud…

Read More

Pro-Palestinian hacking group evolves tactics amid war

Pro-Palestinian hacking group evolves tactics amid war

A long-running pro-Palestinian cyber espionage group known for its targeted campaigns has attempted in recent months to spy on governments in the Middle East using a new tool to gain initial access to targeted systems, researchers with cybersecurity firm Proofpoint said Tuesday. The group’s hacking activities, including highly focused phishing campaigns targeting no more than five entities in any given campaign and the deployment of a new access method, continued through the month of October,…

Read More

Proofpoint Announces Industry-First Innovations – E-ChannelNews.com

Proofpoint Announces Industry-First Innovations – E-ChannelNews.com

Proofpoint, Inc., a leading cybersecurity and compliance company, introduced industry-first innovations that address the top risks organizations face today—from business email compromise (BEC), the leading cause of financial loss for organizations, to ransomware and data exfiltration. The unified solutions, announced at Proofpoint Protect 2023, span the company’s Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms to thwart threats across the most critical stages of the attack chain. Fueled by trillions…

Read More

Supply Chain, Cloud Compromise Worries Growing in Healthcare

Supply Chain, Cloud Compromise Worries Growing in Healthcare

Supply chain attacks and cloud compromises are now overshadowing ransomware as top cyberthreats worrying healthcare sector organizations – but all such incidents are still viewed as significant risks to patient outcomes and safety, said Ryan Witt of security vendor Proofpoint about findings from a new study conducted with research firm Ponemon Institute. The study of 653 healthcare IT and security professionals released Wednesday found that concerns about ransomware as the top cyber threat have dipped….

Read More

Shifting Cybersecurity: The Impact and Implications of LLMs

Shifting Cybersecurity: The Impact and Implications of LLMs

Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development Proofpoint CEO Ashan Willy on Taking an Experimental Approach to Applying Gen AI Tom Field (SecurityEditor) • August 25, 2023     Ashan Willy, CEO, Proofpoint While a significant number of attacks are not yet AI-driven, there’s a noticeable shift in the creation of generative malware and lures for business email compromise, warned Ashan Willy, CEO at Proofpoint….

Read More

Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

The following is a guest article by Ryan Witt, Healthcare Cybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery. Unfortunately, these devices have also significantly enhanced healthcare’s cyber risk, and security researchers have raised alarms about the vulnerabilities of these devices for more than a decade. While we haven’t seen threat actors widely exploiting the vulnerabilities in…

Read More

Getting a Tighter Grip on Supply Chain Security Risk

Getting a Tighter Grip on Supply Chain Security Risk

3rd Party Risk Management , Events , Governance & Risk Management Proofpoint CEO Ashan Willy on Ways to Identify Third-Party Compromises Michael Novinson (MichaelNovinson) • May 7, 2023     Ashan Willy, CEO, Proofpoint Some of the most sophisticated cyberattacks are being targeted at third-party suppliers in an effort to affect their critical clients, said Ashan Willy, CEO of Proofpoint. But often client organizations affected by these attacks do not even realize…

Read More

US Cybersecurity Strategy Shifts Liability Issues to Vendors

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Governance & Risk Management , IT Risk Management , Standards, Regulations & Compliance Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions Michael Novinson (MichaelNovinson) • March 2, 2023     Photo: The White House website A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S. government, according to…

Read More
1 2 3 4 5 6