Threat actors are using image files or Scalable Vector Graphics files to deliver ransomware, download banking Trojans or distribute malware. The campaign uses an open-source tool, AutoSmuggle, to facilitate the delivery of malicious files through SVG or HTML files.
With nearly 350 billion emails sent every day, many containing sensitive data and plans, it's a worrying fact that more than 90% of all successful cyber-attacks start with a phishing email.
The widespread use of LLMs has enabled cyber-criminals to launch sophisticated phishing attacks at scale, which evade...
Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around Microsoft 365 for small and midsized businesses. The acquisition of Vade will allow the joint company to have a strong presence in Europe's two most important markets.
Researchers have created a zero-click, self-spreading worm that can steal personal data through applications that use chatbots powered by generative artificial intelligence. Dubbed Morris II, the malware uses a prompt injection attack vector to trick AI-powered email assistant apps.
Email is a major entry point for threat actors, who have evolved their tactics to bypass traditional security solutions and now leverage AI to make attacks more scalable and harder to detect. In response, organizations are buying AI-enabled solutions to bolster their security posture. Download The Role of AI in Email...
The advent of generative AI has transformed the way modern organizations operate. While many business users are adopting tools like ChatGPT and Google Bard to enhance productivity, cybercriminals are also capitalizing on this technology—resulting in more attacks with increased sophistication.
To understand how...
In the past year, generative AI made groundbreaking strides in understanding and generating human-like text. User-friendly tools like ChatGPT quickly gained popularity, allowing modern businesses to streamline operations like never before. Unfortunately, access to generative AI has also empowered cybercriminals to...
The cyber threat landscape is projected to undergo significant transformation in the coming year, characterized by the emergence of novel and refined threat vectors as well as a resurgence of traditional attack methods.
Advancements in technology have provided malicious actors with an extensive toolkit to exploit...
Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by bad actors? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your...
Silicon Valley email security firm Proofpoint is laying off 280 positions two months into the tenure of Sumit Dhawan as its chief executive officer. A company spokesperson said Proofpoint anticipates moving half the eliminated positions to overseas units in Argentina and Ireland by midyear.
Our email authentication experts will be on hand to provide their insight and a demonstration of how exactly Proofpoint Email Fraud Defense can help identify and close requirement gaps.
Proofpoint landed top VMware lieutenant Sumit Dhawan as its new chief executive just days after the cloud and virtualization giant was acquired by Broadcom. The Silicon Valley-based email security firm said it liked Dhawan's track record of building security, cloud and end-user computing businesses.
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
If "time is money," why spend it on all of those little tasks in a SOC that can add up, eating away at valuable workday hours? Automating these repetitive, low-level activities can free up valuable time so you can focus on more strategic initiatives, such as threat hunting and improving the overall security...
Proofpoint has agreed to purchase a cloud email security provider founded by HSBC, RBS, Santander and UBS alumni to apply artificial intelligence to evolving threats. The proposed acquisition of Boston-based Tessian will help Proofpoint address common forms of data loss including data exfiltration.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.