Proxyshell Vulnerability – Large Exploitation of Microsoft Exchange Servers
Source/Credits/Written By: https://www.linkedin.com/in/vasudev-c/ What is proxyshell vulnerability? Proxyshell is a combination of 3 vulnerabilities CVE-2021-34473, CVE-2021-34523, and CVE-2021- 31207...
View ArticleEmail Header Analysis – Use Cases Including SPF, DKIM & DMARC
We have already discussed how SPF, DKIM & DMARC will function in the email gateway. Here we are going to see two use cases of how the DMARC record will be logged if an email is sent from the...
View ArticleGoogle SMTP Relay Abused to Deliver Phishing Emails
Phishing actors abuse Google’s SMTP relay service to bypass email security products and successfully deliver malicious emails to targeted users. According to a report from email security firm Avanan,...
View ArticleHow to spot a phishing email?
Most of the top-rated attacks vector seems to be a phishing email. While checking the last year’s stats, 70% of attacks were initiated with phishing emails. A wide range of categories is there in...
View ArticlePhishing with Reverse Tunnels and URL Shorteners – Detection & Response
Security researchers are seeing improved use of reverse tunneling services with URL shorteners for large-scale phishing campaigns, making it difficult to stop malicious activity. This practice differs...
View ArticleWeird Trick to Block Password-Protected Files to Combat Ransomware
Helminfosec explained the Weird Trick that blocks Password-Protected files in the Microsoft 365 and Exchange products. Threat actors deploying ransomware typically gain access to victims’ networks...
View ArticleHackers Use New Static Expressway Phishing Technique on Lucidchart
Hackers impersonate trusted brands to find their way into victims’ inboxes because leveraging the legitimacy of a trusted domain means security solutions are more likely to view the e-mail itself as...
View ArticleHow DMARC is used to reduce spoofed emails ?
DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business...
View ArticleEmotet Malware with Microsoft OneNote- How to Block emails based on File...
A new Emotet phishing campaign targets US taxpayers under the guise of W-9 tax forms allegedly sent by the Internal Revenue Service and companies you work with. Emotet is a notorious malware infection...
View ArticleHow To Check Malicious Phishing Links
Beyond the technical tools and methods to identify malicious links, it’s crucial to emphasize the importance of user awareness. Often, phishing attempts prey on human psychology, using urgency, fear,...
View ArticleHow Email Encryption Protects Your Privacy
If someone mediates your messages, your information could be compromised. Because of safety concerns, organizations and people are using email encryption to defend the substance of their messages from...
View Article