Proofpoint

Entity category: organization

Artificial Intelligence

Criminals Sell RAT Malware as Legitimate RMM Tool

A cybercrime operation sells a malicious remote access trojan disguised as a legitimate remote management tool, using a fraudulent Extended…

Read More »
Business

Hackers Now Use Tsundere Bot for Ransomware Attacks

The TA584 threat actor has significantly escalated operations, tripling campaign volume in late 2025 and expanding its geographic targeting to…

Read More »
BigTech Companies

Scam Emails Spoofing Real Microsoft Addresses

A sophisticated email scam exploits a legitimate Microsoft address (no-reply-powerbi@microsoft.com) to send fake Power BI subscription invoices, tricking users into…

Read More »
BigTech Companies

Microsoft 365 Users Hit by Sneaky Device Code Phishing

Attackers are exploiting Microsoft's device code authorization flow to bypass multi-factor authentication, tricking users into granting account access via fraudulent…

Read More »
Business

Police Takedown: Rhadamanthys, VenomRAT, and Elysium Malware Operations Disrupted

An international law enforcement effort led by Europol and Eurojust dismantled over 1,000 servers used by major malware families like…

Read More »
Cybersecurity

DanaBot Malware Returns to Target Windows After 6-Month Hiatus

DanaBot malware has re-emerged with a new version (v669) after a six-month hiatus, now utilizing Tor-based infrastructure and cryptocurrency addresses…

Read More »
Business

Cybercriminals Hijack RMM Tools to Steal Physical Cargo

Cybercriminals are using remote monitoring and management (RMM) tools to hijack freight shipments and steal cargo by posing as legitimate…

Read More »
BigTech Companies

Hijacked OAuth Apps: Your Cloud’s Secret Backdoor

Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and…

Read More »
Business

TA585 Hackers Unleash Advanced New Attack Tools

TA585 is a sophisticated cybercriminal group known for its fully autonomous infrastructure, managing its own phishing campaigns, malware deployment, and…

Read More »
Business

Patient Safety at Risk: The Hidden Cost of Hospital Hacks

Nearly all U.S. healthcare organizations experienced multiple cyberattacks in the past year, primarily involving ransomware, cloud account takeovers, and supply…

Read More »
Artificial Intelligence

Proofpoint’s 4 New Innovations to Secure the Future of Work

The rise of the agentic workspace, where humans and AI agents collaborate, introduces new security challenges that require a fresh,…

Read More »
Artificial Intelligence

Hush Security Launches to Replace Legacy Vaults with Secretless Access

Hush Security has raised $11 million in seed funding to advance its policy-driven, just-in-time access model for machine-to-machine communication, replacing…

Read More »
Business

Sextortion Spyware: Webcam Pics Snapped During Porn Viewing

A new spyware called Stealerium automates the capture of compromising images by monitoring online activity for adult content keywords and…

Read More »
Artificial Intelligence

How CISOs Master Risk, Pressure & Board Demands

Generative AI is viewed by most CISOs as a significant security risk, leading organizations to adopt structured guardrails for controlled…

Read More »
Cybersecurity

ClickFix Attacks Jump 517% in 2025 – What You Need to Know

ClickFix attacks, exploiting human psychology through deceptive error messages, surged by 517% in 2025, becoming the second most prevalent cyber…

Read More »
BigTech Companies

Microsoft patches zero-day flaw as Mirai botnets hit Wazuh servers

Microsoft patched 66 security flaws, including a zero-day exploit (CVE-2025-33053), while Mirai botnets targeted unpatched Wazuh servers via a critical…

Read More »
BigTech Companies

Entra ID Account Takeover Attacks: Researchers Issue Urgent Warning

Security experts warn of a surge in account takeover attacks targeting Microsoft Entra ID, using the TeamFiltration framework to brute-force…

Read More »