• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: proofpoint

CIO, CISO cyber attack confidence

Half of Global CISOs Feel Unprepared to Cope with a Cyber Attack

Despite growing confidence in security posture, Proofpoint’s latest report reveals CISOs feel unprepared to cope with a cyber attack.

May 18, 2022 TD Staff Leave a Comment

With the 2020 scramble to enable remote working, many CISOs have now come to terms with new ways of working. Many CISOs feel more in control of their environment: 48% feel that their organization is at risk of suffering a cyber attack within the next 12 months, down from 64% last year, according to Proofpoint’s […]

Read More

3CX Supply Chain Attack

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

With Microsoft taking action preventing the malicious use of Office macros, the Emotet operators are turning to OneDrive URLs and PowerShell.

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

JCM Global Partners with Cassida Pro on Cash Processing for Gaming Industry

April 19, 2022 TechDecisions Staff Leave a Comment

ANAHEIM, Calif.–(BUSINESS WIRE)–Cassida Pro is proud to announce that as a part of the company’s partnership with JCM Global®, the Cassida Pro Zeus will be on display in JCM Global’s booth, #638, during the Indian Gaming Tradeshow and Convention in Anaheim from April 19-22. As a part of JCM Global’s transaction and payment technology solutions, […]

Read More

Kier Invests in Procore to Support Its Digital-first Ambitions

April 4, 2022 TechDecisions Staff Leave a Comment

LONDON–(BUSINESS WIRE)–Procore Technologies, Inc., a leading global provider of construction management software, today announced that Kier Group Plc, the major UK construction and infrastructure services company, has selected its enterprise-ready platform solution to enhance and standardise operations across its construction business and projects. This agreement will support Kier’s ambitions to be a digital-first business. As […]

Read More

Mobile Malware

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

New strains of mobile malware are recording audio and video, tracking location and destroying or wiping data, according to Proofpoint.

March 10, 2022 Zachary Comeau Leave a Comment

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report. This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

Proofpoint researchers rounded up some of the strangest lures and social engineering tactics it’s observed in 2021.

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

Phishing Success

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

Proofpoint phishing report finds that 60% organizations hit with ransomware in 2021 paid the ransom, but not all data is recovered.

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

ANA Chooses GE Digital’s Fuel Insight to Drive Sustainability Initiatives

February 16, 2022 TechDecisions Staff Leave a Comment

• ANA focuses on data-driven decision making to enable fuel savings and sustainability • Software analyzes flight data, examines fuel usage trends, and quickly identifies savings SAN RAMON, Calif.–(BUSINESS WIRE)–GE Digital today announced that All Nippon Airways (ANA) has implemented Fuel Insight, a software solution that works by understanding real data from the aircraft to […]

Read More

Beyond Identity

Phishing Attacks That Bypass MFA Could Become The Norm

Proofpoint says threat actors are increasingly leveraging phishing kits that can bypass mutli-factor authentication methods.

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

Insider Risk, Microsoft

Both Negligent and Malicious Insider Cyber Threats Are Increasing

Proofpoint survey shows that cybercriminals are increasingly relying on credential theft while malicious insider threats grow.

January 25, 2022 Zachary Comeau Leave a Comment

For the last two years as organizations adapt with remote work and other effects of the COVID-19 pandemic, cybercriminals have had a field day by exploiting weaknesses in distributed work security and the fact that our attention is elsewhere. That has forced many companies to invest in new technology to harden network defenses from outside […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.