Artwork

Content provided by SecurIT360. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SecurIT360 or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 103: Email Spoofing

27:10
 
Share
 

Manage episode 432940838 series 3343083
Content provided by SecurIT360. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SecurIT360 or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360

“EchoSpoofing” — A Massive Phishing Campaign Exploiting...

Spoof intelligence insight - Microsoft Defender for Office 365

How attackers bypass third-party mail filtering to Office 365

Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://twitter.com/cyberthreatpov
Work with Us: https://securit360.com

  continue reading

136 episodes

Artwork
iconShare
 
Manage episode 432940838 series 3343083
Content provided by SecurIT360. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by SecurIT360 or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360

“EchoSpoofing” — A Massive Phishing Campaign Exploiting...

Spoof intelligence insight - Microsoft Defender for Office 365

How attackers bypass third-party mail filtering to Office 365

Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://twitter.com/cyberthreatpov
Work with Us: https://securit360.com

  continue reading

136 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide