Proofpoint researchers have discovered a new ransomware named "Locky" being distributed via MS Word documents with malicious macros. While a variety of new ransomware has appeared since the end of 2015, Locky stands out because it is being delivered by the same actor behind many of the Dridex campaigns we have tracked over the last year.
Most Recent Videos
Targeted Attack Protection Mobile Defense
App threat intelligence and defense for the enterprise Targeted Attack Protection (TAP) Mobile Defense provides enterprises with comprehensive protection and visibility against malicious and privacy-l
Proofpoint & Palo Alto Networks Join Forces To Deliver Threat Protection & Threat Intelligence
Proofpoint and Palo Alto Networks customers can now get unprecedented protection against today’s sophisticated attacks. New cybersecurity threats are always emerging. And they’re targeting your people
Combat Angler Phishing – Stop Fraudulent Customer Support Accounts
Social angler phishing is a dangerous new variant of social media phishing. Fraudsters create fake customer support accounts on social media, then trick your customers into giving away their credentia
Automate Your Social Media Compliance Auditing
Social media presents new compliance challenges. Since 2013, FINRA has been performing social media spot checks, which require you to provide a list of all the financial advisors that represent your
Top 5 Social Media Scams of 2016
Social media scams are on the rise. In 2016, Proofpoint has already seen a 150% increase in social media phishing compared to 2015. Let's look at the top 5 social media scams of 2016. To learn more,
Proofpoint Email Protection: Protecting Against Impostor Email Threats
The latest release of Proofpoint Email Protection adds a new Impostor Email classifier to stop this emerging threat.
Proofpoint: Solving Archiving Challenges
Track, classify, and control your data for streamlined discovery, simplified regulatory compliance, and fast access.
Proofpoint Targeted Attack Protection Demo
Watch the demo of our Targeted Attack Protection solution which detects and blocks phishing, spear phishing, watering holes and other email-borne advanced threats during and after delivery.
Proofpoint Mobile Defense Demo
Watch the demo of our Mobile Defense solution which protects organizations from dangerous mobile applications.
Proofpoint Data Discover Demo
Watch the demo of our Data Discover solution which enables automated discovery and remediation of risky content while mitigating the impact of a data breach.
Proofpoint Social Media Protection Demo
Watch the demo of our Social Media Protection solution which monitors your social media accounts for risk and compliance. Learn more at www.nexgate.com
Proofpoint Locky Demo
Proofpoint researchers have discovered a new ransomware named "Locky" being distributed via MS Word documents with malicious macros. While a variety of new ransomware has appeared since the end of 201
Powered by the Cloud
Proofpoint is a leading cybersecurity company that protects the way people work today. Powered by the cloud, Proofpoint protects organizations from advanced attacks that target email, mobile apps, an
Proofpoint by the Numbers
Learn why Proofpoint is a next-generation cybersecurity company that empowers organizations to protect the way their people work today. From targeted attack protection and enterprise information arch
Cybersecurity Strategy Webinar featuring Gartner
Join the webinar and learn to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Safeguarding Office 365 from Advanced Threats
Proofpoint Extends Office 365 for Advanced Protection & Guaranteed Email Availability.
Proofpoint Threat Protection
Learn how Proofpoint’s next-generation cyber security solutions can help protect the information your people create against phishing, malware, and emerging threats before they happen.
Are You Prepared for a Data Breach?
Did you know the average cost of an online security breach in 2014 was $5.85 million (US)? Learn more about the financial costs of a data breach and how Proofpoint can protect you and your organizati
Proofpoint Example of Hack Speed
Proofpoint Example of Hack Speed Hacker can infiltrate your computer in seconds!
Cyber Security Awareness - How Phishing Works