Blog

Threat Insight

<span class="visually-hidden">View Beyond the breach: inside a cargo theft actor’s post-compromise playbook</span>
Zero Trust Networks
Threat Insight
The Proofpoint Threat Research Team
Beyond the breach: inside a cargo theft actor’s post-compromise playbook
<span class="visually-hidden">View Mailbox rules in O365—a post-exploitation tactic in cloud ATO</span>
DMARC-Blog-Banner
Threat Insight
Anna Akselevich, Pavel Asinovsky, and Yaniv Miron
Mailbox rules in O365—a post-exploitation tactic in cloud ATO
<span class="visually-hidden">View I’d come running back to EU again: TA416 resumes European government espionage campaigns</span>
Europe connect
Threat Insight
Mark Kelly, Georgi Mladenov, and the Proofpoint Threat Research Team
I’d come running back to EU again: TA416 resumes European government espionage campaigns