Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Proofpoint
Proofpoint
New service from Proofpoint prevents email data loss through AI – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 SECURITY New service from Proofpoint prevents email data loss through AI...
Proofpoint
US and UK go after Chinese hackers accused of state-backed operation against politicians, dissidents – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 WASHINGTON (AP) — Hackers linked to the Chinese government launched a...
Proofpoint
Proofpoint’s Inaugural Data Loss Landscape Report Reveals Careless Employees are Organizations’ Biggest Data Loss Problem – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 85% of organizations experienced data loss in the past year; 90%...
Proofpoint
Protecting Against Attacks on NTLM Authentication – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 When it comes to cyberattacks, March has come in like a...
Proofpoint
Proofpoint Honored with Comparably Best Places to Work Awards in Multiple Categories – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Employee ratings highlight Proofpoint’s positive company outlook and exemplary functional departments ...
Proofpoint
New BEC attacks involve US agency spoofing – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Email security, Network SecuritySC StaffMarch 7, 2024Several U.S. government agencies, including...
Proofpoint
BEC, Credential Theft Attacks Spoof U.S. Government Agencies – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 A threat actor has been targeting U.S. organizations with tens of...
Proofpoint
Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known...
Proofpoint
Research Saturday Podcast: The return of a malware menace. – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 This week we are joined by, Selena Larson from Proofpoint, who...
Proofpoint
Cyber defenses ramp up as hacks exploit gaps – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Organizations continue to race against cybercriminals to keep their systems secure...
Proofpoint
The GDPR Playbook – Discover, Plan, and Act on the Upcoming EU Data Protection Regulation
After years of negotiations, the European Union General Data Protection Regulation (EU GDPR) will come into...
Proofpoint
The GDPR Playbook
After years of negotiations, the European Union General Data Protection Regulation (EU GDPR) will come into...
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report by proofpoint
#image_title #image_title Download & read the complete doc below 👇👇👇 pfpt-us-wp-voice-of-the-CISO-reportDownload
Proofpoint
Scammers are targeting college kids with fake bioscience job offers – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Cybercriminals are targeting college students with fake job offers in the...
Proofpoint
Iran is on a hacking spree. The reason why may be ominous. – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Iran’s elite Islamic Revolutionary Guard Corps is accelerating efforts to hack...
Proofpoint
APT35 Develops Mac Bespoke Malware – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 The Iran-linked advanced persistent threat (APT) known as APT35 (aka Charming Kitten, TA453, and...
Proofpoint
Charming Kitten hackers use new ‘NokNok’ malware for macOS – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Security researchers observed a new campaign they attribute to the Charming...
Proofpoint
Taylor Swift fans warned tour tickets ‘highly attractive target for criminals’ – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Taylor Swift fans keen to secure tickets for her 2024 Eras...
Proofpoint
Iranian Hackers’ Sophisticated Malware Targets Windows and macOS Users – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Jul 06, 2023Ravie LakshmananEndpoint Security / Malware The Iranian nation-state actor...
Proofpoint
Security Chiefs Take On IT Roles as More Infrastructure Moves Online – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and...
Proofpoint
Connected Medical Devices—the Next Target for Ransomware Attacks – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 The following is a guest article by Ryan Witt, Healthcare Cybersecurity...
Proofpoint
China Likely Also Sought IP In Barracuda Attacks: Researcher – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Security News Kyle Alspach June 23, 2023, 12:03 PM EDT It...
Proofpoint
Proofpoint Named a ‘Leader’ in Enterprise Email Security by Independent Analyst Evaluation – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 SUNNYVALE, Calif., June 21, 2023 – Proofpoint, Inc., a leading cybersecurity...
Proofpoint
The Gately Report: Proofpoint Partners Help Fuel Growth Amid Economic Uncertainty – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Just a moment... Enable JavaScript and cookies to continue Original Post...
Proofpoint
Meet the cybercrime group that appears to do cyberespionage on the side – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Welcome to The Cybersecurity 202! When I looked out my window...
Proofpoint
AI gives a tactical advantage to hackers, but the cost is prohibitive, expert tells IT Brew – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Top insights for IT prosFrom cybersecurity and big data to software...
Proofpoint
Proofpoint’s 2023 Human Factor Report: Threat Actors Scale and Commoditize Uncommon Tools and Techniques – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 New research provides an in-depth analysis of the modern attack chain...
Proofpoint
The great CISO resignation: Why security leaders are quitting in droves – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Cookie Settings SDxCentral employs cookies to improve your experience on our...
Proofpoint
Cybersecurity Chiefs Navigate AI Risks and Potential Rewards – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Security chiefs say the benefits of artificial intelligence are clear, but...
Proofpoint
More APTs Eye Managed Service Providers in Supply Chain Attacks – Source: www.proofpoint.com
Source: www.proofpoint.com - Author: 1 Sophisticated threat groups are increasingly targeting managed service providers (MSPs) and...
Posts pagination
1
…
4
5
6
7
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025