The Cyber Threat Perspective
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
brad@securit360.com
The Cyber Threat Perspective
(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Welcome to this replay on The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on how attackers are bypassing advanced email protections.
In this episode, we cover:
- The fundamentals of email spoofing and why it's a significant threat.
- Insight into the recent echo spoofing campaign exploiting Proofpoint's misconfiguration.
- The role of SPF, DKIM, and DMARC in combating email spoofing.
- How threat actors are using Microsoft 365 to bypass email protections.
- Mitigation strategies and the latest updates from Proofpoint and Microsoft to address these vulnerabilities.
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://spenceralessi.com
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.