Uncovering the hidden dangers of email-based attacks

Email-based attacks have evolved beyond traditional spam and phishing attempts. Cybercriminals now employ sophisticated tactics such as spear-phishing, whaling, and business email compromise (BEC), posing a significant threat to businesses of all sizes… Continue reading Uncovering the hidden dangers of email-based attacks

SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols

A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms.
The post SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols appeared first on SecurityWeek.
Continue reading SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols

Proton Launches Native Mail App on Desktop in Limited Beta

Privacy-focused Proton has finally launched a native Proton Mail app on Windows and Mac in a limited beta, with plans to expand access to more users in early 2024.
The post Proton Launches Native Mail App on Desktop in Limited Beta appeared first on Th… Continue reading Proton Launches Native Mail App on Desktop in Limited Beta

UK’s Ministry of Defence fined after Bcc email blinder that put the lives of Afghan citizens at risk

The British Ministry of Defence (MoD) has been fined £350,000 for recklessly causing a data breach that exposed the personal details of citizens of Afghanistan who were seeking to flee the country after the Taliban took control in 2021.

Read more in… Continue reading UK’s Ministry of Defence fined after Bcc email blinder that put the lives of Afghan citizens at risk

Recruiters, beware of cybercrooks posing as job applicants!

Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and content of the emails suggest to the recipient the actor is a legitimate candidate, and be… Continue reading Recruiters, beware of cybercrooks posing as job applicants!

Is it possible for an attacker to change an email-attachment of a received email client-side and synchronize it via IMAP with Webmailer?

an attacker manipulated the IBAN of an invoice.pdf attached to a received email. The question remains, can said attacker manipulate/change such a pdf client-side and cause an IMAP synchronization with the webmailer provided by a hoster?
I … Continue reading Is it possible for an attacker to change an email-attachment of a received email client-side and synchronize it via IMAP with Webmailer?

Russian hackers use old Outlook vulnerability to target Polish orgs (CVE-2023-23397)

Russian state-backed hacking group Forest Blizzard (aka Fancy Bear, aka APT28) has been using a known Microsoft Outlook vulnerability (CVE-2023-23397) to target public and private entities in Poland, Polish Cyber Command has warned. Compromising email … Continue reading Russian hackers use old Outlook vulnerability to target Polish orgs (CVE-2023-23397)