The Impostor in the Machine (French)

Provided by: Proofpoint
Topic: Security
Format: PDF
Advanced threats are shifting once again, and you and your company will likely become the target of a new type of threat. Carefully planned and researched, impostor emails target specific people in your company. Either you become the target of this attack or you become the unwitting victim. Impostor emails do not use malware or URLs found in typical credential phishing schemes.

Impostor emails are a result of attackers shifting tactics to evade security solutions that are designed to detect malware attachments and malicious URLs.

Download this white paper to learn more about impostor emails' principles, consequences and how you can protect your company.

Find By Topic