Last Time in the BEC Taxonomy Series… Proofpoint researchers in the second of the Business Email Compromise (BEC) taxonomy series began delving into the Theme tier of the Email Fraud Taxonomy framework (Figure 1), focusing on invoice fraud and demonstrating how the...
All articles from category
Threat Actors Exploit Microsoft and Google Platforms to Host and Send Millions of Malicious Messages
Organizations worldwide have adopted cloud collaboration tools in record numbers—and attackers have quickly followed. In recent months we have observed an acceleration in threat actors abusing Microsoft and Google’s popular infrastructure to host and send threats...
Do you need IT support?
Our expertise is in network design, server deployments, remote access (VPN), and cybersecurity.