Proofpoint Profile Banner
Proofpoint Profile
Proofpoint

@proofpoint

Followers
30,567
Following
1,965
Media
12,994
Statuses
25,763

Proofpoint protects your people, data and brand against advanced cyber threats and compliance risks. Follow @threatinsight for updates on the threat landscape.

Sunnyvale, CA
Joined February 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@proofpoint
Proofpoint
8 years
How good is your email security? Find out with our Threat Discovery Email assessment tool:
Tweet media one
0
81
145
@proofpoint
Proofpoint
9 years
Proofpoint’s been positioned as a leader in #GartnerMQ for Secure Email Gateways! http://t.co/p8fY6nresu http://t.co/0HXd9mL6Nz
Tweet media one
6
44
100
@proofpoint
Proofpoint
8 years
90% of targeted attacks happen via email. Discover threats with Proofpoint’s Threat Discover
Tweet media one
2
21
73
@proofpoint
Proofpoint
1 year
Proofpoint researchers found a new #malicious 3rd party #OAuth app campaign that abused the #Microsoft “verified publisher” status to bypass restrictions. Observed impact: App impersonation. Compromised mailboxes. Data exfiltration. Brand abuse. Blog:
Tweet media one
2
44
71
@proofpoint
Proofpoint
1 year
Our @threatinsight researchers have tracked a recent rise in campaigns abusing #Microsoft #OneNote . This graph breaks down the wide variety of #malware distributed using this method. AsyncRAT tops the list, with familiar suspects Agent Tesla and Qbot also appearing.💡
Tweet media one
4
30
65
@proofpoint
Proofpoint
6 years
#Kronos reborn as Osiris? Proofpoint @threatinsight researchers examine a new Tor-enabled version of the aging banker. #Infosec
Tweet media one
2
46
63
@proofpoint
Proofpoint
9 years
On average, 1:25 malicious messages delivered are clicked by users #RSAC #ProofpointRSAC http://t.co/QNBgTDxUyg http://t.co/ueaX4Fb9vD
Tweet media one
2
31
55
@proofpoint
Proofpoint
9 years
Reports indicate that regulators are taking #cybersecurity very seriously. #FinServ #FINRA http://t.co/QGebcDhbyT http://t.co/WrygiTXSEL
Tweet media one
5
21
40
@proofpoint
Proofpoint
9 months
Proofpoint @threatinsight researchers shared findings on a new malware strain that is distributed via bogus installation packages of the Bitwarden password manager. @TheHackersNews covered the analysis of this malware named ZenRAT.
0
30
46
@proofpoint
Proofpoint
7 years
This malvertising activity involved a top 25 US Alexa rank website & potentially affected millions. #InfoSec
Tweet media one
0
57
37
@proofpoint
Proofpoint
3 years
TA575 Uses ‘Squid Game’ Lures to Distribute #Dridex malware. via the Proofpoint @threatinsight research team. #TA575 #Malware
Tweet media one
1
17
39
@proofpoint
Proofpoint
11 months
Qbot affiliates including TA570 and TA577 have all taken at least a month off over the summer in the past three years. TA577, one of the largest #Qbot affiliates, delivered its last campaign to date on 21 June.
Tweet media one
1
13
38
@proofpoint
Proofpoint
9 years
Learn how attackers exploit end-users' psychcology w/ the Human Factor http://t.co/cyg0dJ8i1G #RSAC #ProofpointRSAC http://t.co/v09mMDMX8W
Tweet media one
4
12
31
@proofpoint
Proofpoint
7 years
Proofpoint @threatinsight Team Finds Potential APT Attack by Russian-Speaking Threat Actors Aimed at #G20 #InfoSec
Tweet media one
Tweet media two
Tweet media three
0
35
26
@proofpoint
Proofpoint
10 months
⚡️Threat Actor Spotlight: TA2715⚡️ TA2715 is a financially motivated threat actor we’ve been tracking since September 2019. The group is notable for using Microsoft Excel documents that exploit a vulnerability in Excel’s Equation Editor to deliver their malware payloads. 🧵1/4
1
13
33
@proofpoint
Proofpoint
5 months
Proofpoint cloud threat researchers have been monitoring a sophisticated hybrid campaign named VodkaNimbus, featuring #Microsoft365 themed #credential phishing, #Cloud Account Takeover ( #ATO ), and post-compromise usage of dedicated cloud malware.
1
14
29
@proofpoint
Proofpoint
6 years
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RA. via @threatinsight research team.
Tweet media one
0
15
27
@proofpoint
Proofpoint
8 years
Ransomware is back in a big way: 24% of attachment based email attacks featured ransomware:
Tweet media one
1
22
28
@proofpoint
Proofpoint
7 years
Adylkuzz, @monerocurrency miner closing SMB door, is being spread massively via EB/DP, since at least 05-02-17
Tweet media one
Tweet media two
Tweet media three
0
41
27
@proofpoint
Proofpoint
9 years
Avg Fortune 100 firm has over 320 branded social accounts. #socialmedia #compliance http://t.co/4EiAg1aKuX http://t.co/5EI26hUk7p
Tweet media one
0
7
25
@proofpoint
Proofpoint
8 years
Have an extra $130,000? The average cost of BEC phishing cyber crime. Proofpoint protects:
Tweet media one
0
14
24
@proofpoint
Proofpoint
9 years
Avg cost of a #DataBreach in 2014: $5.85M. For full infographic: http://t.co/oOnvTzxfrK http://t.co/wHbWmZw1CP
Tweet media one
2
14
24
@proofpoint
Proofpoint
9 years
Tweet media one
1
18
27
@proofpoint
Proofpoint
8 years
Our CEO Gary Steele talks with @jimcramer about protecting clients from BEC attacks & malicious apps- #Phishing
0
41
25
@proofpoint
Proofpoint
8 years
Threat Actors Using Real PayPal Accounts To Distribute Chthonic Banking Trojan: #Malware
Tweet media one
2
20
25
@proofpoint
Proofpoint
1 year
Cyber criminals have been experimenting with new #malware delivery techniques ever since #Microsoft started blocking #Excel #macros . In January, Proofpoint saw a massive increase in the number of campaigns using #OneNote . Follow @threatinsight for more threat landscape updates.
Tweet media one
0
13
26
@proofpoint
Proofpoint
2 years
Have you ever wanted to step into the mind of a threat actor? On Wednesday Aug. 10, Sherrod DeGrippo, VP of Threat Research and Detection, and Kelsey Merriman, Threat Researcher, will help you do just that. This is a #BHUSA session you won't want to miss.
Tweet media one
0
5
25
@proofpoint
Proofpoint
9 years
Our researchers examined drivers behind exploit techniques in massive campaigns. #GartnerSEC http://t.co/3GYg9DaQbo http://t.co/KvSHIcoTuT
Tweet media one
3
7
21
@proofpoint
Proofpoint
8 years
[Update] CryptXXX 2.0 #Ransomware Authors Render Decryption Tool Ineffective: @threatinsight
Tweet media one
0
14
19
@proofpoint
Proofpoint
4 years
DO NOT OPEN: Malicious threat actor using copy straight from the #DNC 's website in latest social engineering lure. Do not open emails or attachment with subject “Team Blue Take Action” #DNC #InsiderThreat #CyberSecurity #BeCyberSmart
Tweet media one
0
31
22
@proofpoint
Proofpoint
6 years
#HappyHolidays ! Best wishes for a secure and prosperous New Year from the entire Proofpoint team!
Tweet media one
0
8
11
@proofpoint
Proofpoint
7 years
Consumer Alert: Beware of the #CanYouHearMe Robocall Scam: via @NBCNightlyNews with @Proofpoint VP @RKalember .
Tweet media one
1
34
17
@proofpoint
Proofpoint
7 years
Proofpoint researchers detail the history of the “ #KovCoreG Gang” and the evolution of the tools they use: #InfoSec
Tweet media one
Tweet media two
Tweet media three
1
15
15
@proofpoint
Proofpoint
9 years
What are best practices for migrating to #Office365 ? Read advice from @mosterman . http://t.co/ysAnrxFVZu http://t.co/tyHljzQISc
Tweet media one
2
0
19
@proofpoint
Proofpoint
9 months
⚡️Threat Actor Spotlight – TA544: Ursnif Love in the Air⚡️ TA544 is no stranger to #Ursnif . This financially motivated group has distributed the banking #malware in high-volume campaigns for several years. But in a recent campaign, we noticed TA544’s lures taking an unusual turn…
1
8
22
@proofpoint
Proofpoint
1 year
In early Nov., Emotet returned to the #email #threatlandscape for the first time since July 2022. @threatinsight observed multiple changes to #Emotet and its payloads, including the lures used and changes to its modules, loader, and packer. #TA542 #IcedID
Tweet media one
0
7
20
@proofpoint
Proofpoint
5 years
As part of making the #internet a safer place, we are offering ETPro at no cost as part of our partnership with the Open Source network #security platform OPNSense.
Tweet media one
1
10
21
@proofpoint
Proofpoint
11 months
⚡️Threat Actor Spotlight: TA2541 ⚡️ #TA2541 is a persistent cybercriminal actor that distributes various remote access trojans (RATs) targeting the aviation, aerospace, transportation, and defense industries, among others.
1
11
20
@proofpoint
Proofpoint
2 years
Can countering human thought processes help orgs build more resilient defense models against attacks? Find out at #BHUSA as Proofpoint threat research experts @sherrod_im and @k3dg3 dive into the mind of a #threatactor . Learn more about this session at .
Tweet media one
0
5
19
@proofpoint
Proofpoint
7 years
Proofpoint Enters into Definitive Agreement to Acquire @Cloudmark ; Strengthens Investment in Messaging Security &...
Tweet media one
0
18
17
@proofpoint
Proofpoint
7 years
Be wary of email terms like- payment, request, and urgent in internal mails, @proofpoint report says. via @Fedweek #DMARC
0
7
5
@proofpoint
Proofpoint
2 years
The UK is the most likely country to pay cyber-criminals after #ransomware attacks. Recent #Proofpoint research shows that 82% of UK companies paid hackers to get their data back, against a global average of 58%, via @BBCNews and @joetidy . #CyberAware
1
15
18
@proofpoint
Proofpoint
8 months
Proofpoint has entered into a definitive agreement to acquire @Tessian , an innovator in the use of advanced #AI to automatically detect and guard against both accidental #dataloss and evolving #email threats. Read the announcement:
Tweet media one
0
6
19
@proofpoint
Proofpoint
2 years
To stay ahead of #hacker , become one. At #GSX2022 , @sherrod_im will share how to build a #malicious threat campaign and the steps needed to create and send a #malware campaign for profit. Inhabit the threat actor’s mind and become a better defender:
Tweet media one
0
4
20
@proofpoint
Proofpoint
2 years
Ever wondered how one obtains a job in the unique field of #SocialEngineering ? Tomorrow at #DEFCON30 @sec_defcon , industry experts, including Proofpoint's @sherrod_im , will share their tips with those who are curious about pursuing a #career in the field.
Tweet media one
1
6
19
@proofpoint
Proofpoint
7 years
Highly personalized, targeted email campaigns focus on exploiting the #HumanFactor , not just the code.
Tweet media one
0
69
8
@proofpoint
Proofpoint
9 years
. @NXGate continues analysis of #socialmedia accounts of #NCAA Men’s Final Four. http://t.co/AM2tW4v3vb http://t.co/dKBDNQ2Fdz
Tweet media one
0
4
17
@proofpoint
Proofpoint
4 years
Proofpoint threat researchers have observed a new VB6 downloader that abuses cloud services in the wild that we and other researchers are calling #GuLoader .
0
11
18
@proofpoint
Proofpoint
6 years
Patrick Wheeler, director of threat intelligence @proofpoint quoted here - Small,Targeted #Ransomware Attacks Emerge. via @DarkReading
0
12
7
@proofpoint
Proofpoint
7 years
#Ransomware accounted for 64% of all #malware traffic in Q3. Get more of the latest threat trends in our new report:
0
2
8
@proofpoint
Proofpoint
7 years
. @proofpoint researcher @darienhuss quoted- #WannaCry How $10.69 may have sidelined the global #malware attack.
0
17
15
@proofpoint
Proofpoint
7 years
This expensive new #ransomware targets organisations with specially crafted #phishing lures via @ZDNet
Tweet media one
2
20
15
@proofpoint
Proofpoint
7 years
U.S. Government’s #DMARC Mandate: A Step in the Right Direction. #InfoSec
Tweet media one
0
9
13
@proofpoint
Proofpoint
8 years
Is Angler EK Sleeping with the Fishes? Neutrino exploit kit now distributing most CryptXXX :
Tweet media one
0
9
16
@proofpoint
Proofpoint
3 years
Proofpoint threat researchers have observed the adoption of a novel and easily implemented phishing attachment technique by APT threat actors in Q2 and Q3 of 2021. This technical blog shares more. #CyberSecurity #InfoSec #ThreatActors
1
17
15
@proofpoint
Proofpoint
6 years
Yes, #Malware is Bad. But Your Biggest Security Threat May Come From Your #SocialMedia Accounts. #DigitalRisk
Tweet media one
1
13
11
@proofpoint
Proofpoint
7 years
How a 22-year-old inadvertently stopped a worldwide #cyberattack . via @USATODAY #InfoSec
Tweet media one
2
15
11
@proofpoint
Proofpoint
2 years
Proofpoint is thrilled to announce that Ashan Willy has been named CEO, effective immediately, after unanimous board approval. 🎉 We are excited to continue delivering world-class products and excellent customer experience under his leadership.
Tweet media one
0
4
16
@proofpoint
Proofpoint
4 years
What You Need to Know About Iranian #CyberAttacks : #Proofpoint Senior Director of Threat Research and Detection Sherrod DeGrippo discusses Iran’s advanced persistent threat (APT) program and what it means for your organization. #CyberSecurity
0
23
15
@proofpoint
Proofpoint
7 years
Tweet media one
0
8
15
@proofpoint
Proofpoint
8 years
Proofpoint CEO @GaryLSteele talking about #cybersecurity in 2017 and state-sponsored hacking: via @TheStreetTV
Tweet media one
0
16
11
@proofpoint
Proofpoint
8 years
Clones of Recent #PokemonGO Android App Are Spreading DroidJack RAT #Malware : via @softpedia
Tweet media one
0
12
13
@proofpoint
Proofpoint
4 years
"Emotet is one of the world's most disruptive threats and organizations worldwide should take its return seriously," says @sherrod_im via @ZDNet
0
9
15
@proofpoint
Proofpoint
7 years
#WiFi Man-in-the-Middle Attacks: New #eBook on What to Know, How to Stop Them. #CyberSecurity
Tweet media one
1
1
4
@proofpoint
Proofpoint
1 year
We've seen a range of known cyber criminals use HTML smuggling. While much of the activity can’t be readily attributed, high-volume threat actors #TA570 and #TA577 are the most prominent in our data. More @threatinsight ➡️ . #cybersecurity
Tweet media one
0
8
15
@proofpoint
Proofpoint
7 years
The visibility gap has become one of #cybersecurity ’s fastest growing problems. Don't get #Blindsided -
Tweet media one
0
12
13
@proofpoint
Proofpoint
7 years
Research via @threatinsight team- RAT Cook: Chinese APT actors use fake #GameOfThrones leaks as lures. #InfoSec
Tweet media one
Tweet media two
1
11
13
@proofpoint
Proofpoint
4 years
Coronavirus Scam Alert: Watch Out For These Risky COVID-19 Websites And Emails. via @Forbes (Featuring Proofpoint @threatinsight research)
0
12
15
@proofpoint
Proofpoint
7 years
“Vital knowledge everyone should be arming themselves with to avoid falling victim to #cybercrime ” - @siliconrepublic
0
4
5
@proofpoint
Proofpoint
9 years
Festivities have begun as we celebrate our expanded #SiliconSlopes presence! #utbiz http://t.co/joGWCskrUF
Tweet media one
0
9
14
@proofpoint
Proofpoint
8 years
Proofpoint Stays One Step Ahead of #BEC Attackers, Acquires @ReturnPath Email Fraud Protection Business Unit:
0
11
13
@proofpoint
Proofpoint
8 years
Nightmare on Tor Street: New Ursnif Variant Dreambot Adds #Tor Functionality: @ThreatInsight
Tweet media one
0
20
13
@proofpoint
Proofpoint
8 years
It's Quiet...Too Quiet: Necurs Botnet Outage Crimps #Dridex and #Locky : via @ThreatInsight
Tweet media one
2
12
12
@proofpoint
Proofpoint
7 years
Our #SocialMedia compliance expert @Belbey delivering pro tips on securing government social media accounts at the @hootsuite #SocialGov workshop. 📷 via @jaimestein , @DaynaRowden , & @the_relworld
Tweet media one
Tweet media two
Tweet media three
0
7
11
@proofpoint
Proofpoint
8 years
5th consecutive year being named a @Gartner_Inc  Magic Quadrant Leader for Enterprise Information Archiving:
Tweet media one
0
17
12
@proofpoint
Proofpoint
7 years
Plus d’une entreprise française sur cinq ne sera pas en conformité avec la réglementation #RGPD en mai 2018.
Tweet media one
0
1
2
@proofpoint
Proofpoint
23 days
. @Sleuthcon is poised to start strong, with Selena Larson's presentation on the collision of APTs and cybercrime first on the agenda! Join her as she argues that some of the most successful cybercriminals are the most persistent and sophisticated threats.
Tweet media one
0
5
14
@proofpoint
Proofpoint
7 years
Malicious URL #Emails Soar 600% in Q3 #CyberSecurity
0
5
4
@proofpoint
Proofpoint
10 months
⚡️Search-ms URI protocol abuse⚡️ The Windows search protocol has recently emerged as a new vector for #malware delivery. Attackers are abusing the“search-ms” URI protocol handler to locally display malicious files hosted on a remote server.
1
7
14
@proofpoint
Proofpoint
5 years
Congratulations to @ederouet Senior Director of International Corporate Communications @proofpoint on being named one of London's Top 100 B2B #Marketing Influencers:
Tweet media one
1
2
14
@proofpoint
Proofpoint
2 months
A new malware called Latrodectus has been spotted by researchers at Proofpoint & @teamcymru_S2 . With similar infrastructure and operational overlaps, the teams believe that the developers of #IcedID are behind Latrodectus. Learn more in BleepingComputer.
1
3
14
@proofpoint
Proofpoint
6 years
The World Economic Forum ranked cyber-attacks and #databreaches second only to natural disasters and extreme weather in terms of risk, the protection of data is a priority no one can ignore. #DataPrivacyDay #PrivacyAware
0
15
10
@proofpoint
Proofpoint
2 months
Proofpoint has published a new report focused on threat actor #TA427 , also known as #EmeraldSleet , #APT43 , #THALLIUM or #Kimsuky . The APT group, believed to be aligned with North Korea, has increased its #socialengineering activity, among other tactics.
1
6
14
@proofpoint
Proofpoint
6 years
Cybercriminals phish 'the human factor' for everything it's worth. #Phishing via @SecurityBriefEU #HumanFactor
0
10
10
@proofpoint
Proofpoint
7 years
Stop business email compromise, imposter #email , and CEO email fraud: #Infographic #BEC
Tweet media one
0
10
11
@proofpoint
Proofpoint
7 years
#5Steps to take if your personal data has been breached - via @CBROnline #InfoSec
0
7
8
@proofpoint
Proofpoint
5 months
IOCs Apps: 1. quantum365 (app ID: b4501592-bfc8-4b02-a436-3eeaba28553e); Active; created: 2018 2. Calendar (app ID: 6c162c50-ec6b-4104-b202-c9e0a628f590); Active; created: 2019 3. Drive (app ID: c5d81fe1-ab3e-4b1a-9610-19300c01de20); Active; created: 2020 4. Rods (app ID:…
2
5
14
@proofpoint
Proofpoint
8 years
Doh! New "Bart" #Ransomware from Threat Actors Spreading #Dridex & Locky: via @ThreatInsight
Tweet media one
0
12
14
@proofpoint
Proofpoint
7 years
Of Hacking, Time Machines, Dr. Who's TARDIS, and #IoT #InfoSec :
Tweet media one
0
18
13
@proofpoint
Proofpoint
6 years
Yes, #Malware is Bad. But Your Biggest Security Threat May Come From Your #SocialMedia Accounts. #DigitalRisk
Tweet media one
0
11
10
@proofpoint
Proofpoint
6 years
Press Release: @Proofpoint agrees to acquire @WombatSecurity for $225m in cash, moves into #phishing simulation and #InfoSec awareness Training Market.
0
14
13
@proofpoint
Proofpoint
6 years
📥 Email subject lines - “About a role” - “Job Application” - New version of #AZORult stealer improves loading features, spreads alongside #ransomware in new campaign. #Malware
Tweet media one
0
8
9