Snapshot of Global Traffic Abuse

 

PreviousPlay/PauseNext

You can count on Cloudmark to bring together the latest trends, insights, and conversations about network traffic abuse. Visit often to stay up to speed on email, mobile, web, and DNS security threats.

Our 2016 Q2 Security Threat Report provides our unique insights to the latest trends. Featured stories in this quarter's report include:

  • The plummeted distribution volumes of the Locky Ransomware family
  • Disappearance of the Necurs botnet
  • Suing Spammers, a profile on SF-based lawyer Dan Balsam
  • Country report: Bangladesh and Vietnam
  • Mobile messaging in the U.S. and the differences between carriers and NUVOs

Get more Threat Research

Latest From Cloudmark's Blog

  1. Newly Disclosed Vulnerability in MS Word Allows Code Execution Without Macros Enabled

    Oct 10, 2017 by Andrew Conway

    Macros in Microsoft Word documents have been used for malware delivery for a long time. Any document that asks you to “Enable Content” should raise a big red flag. However, a newly disclosed vulnerability in Word allows the download and execution of arbitrary malware even when macros are not enabled. Microsoft has no plans to […]

    Continue reading...

  2. Binary Options Recovery

    Oct 2, 2017 by Andrew Conway

    We’ve reported before on binary options scams, fake trading schemes that bilk consumers all over the world out of millions of dollars a year. We were happy to see that US law enforcement is starting to take action against the alleged perpetrators of these scams, with the arrest this month of Lee Elbaz (aka Lena […]

    Continue reading...

Track the Conversation

In The News

See more Cloudmark news

Twitter Feed

Follow Cloudmark

Sign up to receive information to keep you one step ahead of cyber criminals.

Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.