Proofpoint researchers identified a new malware call WikiLoader. It was first identified in December 2022 being delivered by TA544, an actor that typically uses Ursnif malware to target organisations.
How organisations can detect and respond to compromised employee identities
Threat actors understand that people hold access to an organisation’s most critical data, and that many can easily be tricked into unknowingly putting the security of their organisation in jeopardy.
CISOs in the Middle East have had to deal with the loss of sensitive data in the past 12 months
75% of CISOs in the UAE believe employees leaving the organisation contributed to the data loss incident, a challenge exacerbated by staff turnover.
More than a third of retailers leaving Ramadan shoppers vulnerable to email fraud
Only 65% of the top 20 Middle East retailers have implemented the minimum level of DMARC protection, meaning 35% are taking no steps to prevent malicious actors spoofing their domain.
Threat actors double down on emerging and proven tactics to outwit employees
Among the organisations in the UAE that experienced attempted email-based phishing attacks, eight in 10 (86%) experienced at least one successful attack, 44% reporting direct financial losses as a result.
Building strong cybersecurity habits in 2023
Security awareness trainings should provide examples of real-world threats, educate users on what to do when faced with threats, help build positive cybersecurity habits, and gauge how users apply what they learn to real-world situations.
Six ways to spot a holiday cyber scam
Six ways to spot a holiday cyber scam.
A people-centric approach to data protection
Veronica Martin caught up with Haifa Ketiti, Senior System Engineer at Proofpoint to discuss GITEX 2022 and the company’s plans …
79% of Saudi companies are putting customers at risk of fraudulent emails
Proofpoint research reveals 79% of top Saudi companies are putting customers at risk of receiving fraudulent emails.
Smishing vs. Phishing: Understanding the Differences
Smishing vs. Phishing: Understanding the Differences.