Phishing with Proofpoint: Cyber attack disguises itself as a security link
Cybercriminals are using Proofpoint’s link wrapping system to carry out targeted phishing attacks. The attackers exploit Proofpoint’s protection to make fraudulent URLs appear credible, using compromised email accounts and multi-level detours to disguise the actual target.