
Data Sheet
ThreatBlockr and Proofpoint Data Sheet
Today’s advanced attacks are launched with increasing frequency by cyber criminals who have many different motives. Some focus on making a profit, and some engage in espionage. The tools they use in these attacks have things in common. But each campaign uses botnets, proxies, attack vectors and command and control systems in a unique way. This makes it nearly impossible to keep pace with changes in the threat landscape.