Proofpoint researchers have discovered a new ransomware named "Locky" being distributed via MS Word documents with malicious macros. While a variety of new ransomware has appeared since the end of 2015, Locky stands out because it is being delivered by the same actor behind many of the Dridex campaigns we have tracked over the last year.
Most Recent Videos
Stop Social Account Hacks in Their Tracks
Hackers use a variety of entry points to gain access to your social media accounts. Once your account is hacked, both your company and your customers are at risk. Learn how Proofpoint can help you sto
Proofpoint Mobile Defense
App threat intelligence and defense for the enterprise Mobile Defense provides enterprises with comprehensive protection and visibility against malicious and privacy-leaking iOS and Android apps. Thes
Protection Proofpoint Contre les Menaces
Découvrez comment les solutions de cybersécurité nouvelle génération de Proofpoint peuvent vous aider à protéger les données que vos collaborateurs créent contre les menaces avancées.
Proofpoint Schutz vor Bedrohungen
Erfahren Sie, wie Cybersicherheitslösung der nächsten Generation von Proofpoint Ihnen dabei helfen können, die von Ihren Mitarbeitern generierten Daten vor hochentwickelten Bedrohungen zu schützen.
Protéger Microsoft Office 365
Proofpoint offre une protection avancée et complète pour Office 365.
Sichern von Microsoft Office 365
Proofpoint erweitert Office 365 um einen modernen Schutz.
Visibility into the Modern Threat Landscape – Webinar
Look Beyond the Network. Join our webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today. As the only company with threat intelligence for th
Targeted Attack Protection Mobile Defense
App threat intelligence and defense for the enterprise Targeted Attack Protection (TAP) Mobile Defense provides enterprises with comprehensive protection and visibility against malicious and privacy-l
Proofpoint & Palo Alto Networks Join Forces To Deliver Threat Protection & Threat Intelligence
Proofpoint and Palo Alto Networks customers can now get unprecedented protection against today’s sophisticated attacks. New cybersecurity threats are always emerging. And they’re targeting your people
Combat Angler Phishing – Stop Fraudulent Customer Support Accounts
Social angler phishing is a dangerous new variant of social media phishing. Fraudsters create fake customer support accounts on social media, then trick your customers into giving away their credentia
Automate Your Social Media Compliance Auditing
Social media presents new compliance challenges. Since 2013, FINRA has been performing social media spot checks, which require you to provide a list of all the financial advisors that represent your
Top 5 Social Media Scams of 2016
Social media scams are on the rise. In 2016, Proofpoint has already seen a 150% increase in social media phishing compared to 2015. Let's look at the top 5 social media scams of 2016. To learn more,
Proofpoint Email Protection: Protecting Against Impostor Email Threats
The latest release of Proofpoint Email Protection adds a new Impostor Email classifier to stop this emerging threat.
Proofpoint: Solving Archiving Challenges
Track, classify, and control your data for streamlined discovery, simplified regulatory compliance, and fast access.
Proofpoint Targeted Attack Protection Demo
Watch the demo of our Targeted Attack Protection solution which detects and blocks phishing, spear phishing, watering holes and other email-borne advanced threats during and after delivery.
Proofpoint Mobile Defense Demo
Watch the demo of our Mobile Defense solution which protects organizations from dangerous mobile applications.
Proofpoint Data Discover Demo
Watch the demo of our Data Discover solution which enables automated discovery and remediation of risky content while mitigating the impact of a data breach.
Proofpoint Social Media Protection Demo
Watch the demo of our Social Media Protection solution which monitors your social media accounts for risk and compliance. Learn more at www.nexgate.com
Proofpoint Locky Demo
Proofpoint researchers have discovered a new ransomware named "Locky" being distributed via MS Word documents with malicious macros. While a variety of new ransomware has appeared since the end of 201
Powered by the Cloud