Archive for the ‘Email Security’ Category

CISA Orders Action Against Exchange Vulnerabilities

“CISA has determined that this exploitation of Microsoft Exchange on-premises products poses an unacceptable risk to Federal Civilian Executive Branch agencies and requires emergency action,” the agency said in supplementary guidance to the earlier CISA Emergency Directive (ED) 21-02. “This determination is based on the current exploitation of these vulnerabilities in the wild, the likelihood of the vulnerabilities […]

Leave a Comment

Microsoft says China-backed hackers are exploiting Exchange zero-days

Leave a Comment

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security experts observed a surge in the attacks against Microsoft Exchange mailservers worldwide. Check Point Research team reported that that in a time span of 24 hours the exploitation attempts are […]

Leave a Comment

Developing a Strong Security Posture in the Era of Remote Work

Leave a Comment

Exchange Servers targeted via zero-day exploits, have yours been hit?

Microsoft has released out-of-band security updates for seven bugs affecting Microsoft Exchange Servers, four of which are zero-day vulnerabilities being exploited by attackers in the wild to plunder on-premises machines. Source: The zero-day bugs affecting Exchange Servers

Leave a Comment

COMB breach: 3.2B email and password pairs leaked online

Leave a Comment

Google Urgently Fixed A Gmail Bug After Delaying It For Months

Email spoofing Gmail bug could bypass SPF, DMARC checks. After 137 days of report, Google fixed the bug within 7 hours of public disclosure. Source: Google Urgently Fixed A Gmail Bug After Delaying It For Months How to secure your GMAIL account like a pro | YubiKey Tutorial Secure your login and protect your Gmail, […]

Leave a Comment

Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security

Organisations need to upgrade their email security Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security measures and what needs to be done to improve the state of security in the public sector. Source: Lagging behind: why government organisations need to upgrade their email […]

Leave a Comment

Hackers could read non-corporate Outlook.com, Hotmail for six months

Hackers and Microsoft seem to disagree on key details of the hack. Source: Hackers could read non-corporate Outlook.com, Hotmail for six months Enter your email address: Delivered by FeedBurner  Subscribe in a reader

Leave a Comment

Phishers’ new trick for bypassing email URL filters – Help Net Security

Phishers have come up with another trick to make Office documents carrying malicious links undetectable by many e-mail security services. Source: Phishers’ new trick for bypassing email URL filters – Help Net Security

Leave a Comment

Phishing emerges as major corporate security threat

Source: Computer World The successful use of phishing emails to breach secure organizations like Oak Ridge National Laboratory and RSA are stark reminders of the serious threat posed by what some experts have dismissed as as a low-tech method of attack. Oak Ridge, a U.S. Department of Energy-run research lab, this week disclosed it had […]

Comments (3)

Sophisticated phishing attack and countermeasures

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Phishing is a practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization’s logo, in an attempt to steal passwords, financial or personal information. In daily life people advise to retrace your steps when you […]

Leave a Comment

12 Phishing Threats and Identity Theft

Have you ever thought of losing something and you cannot live without it? Yes, that something can be your identity. Phishing is a practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization’s logo, in an attempt to steal passwords, financial or personal information. In daily […]

Comments (1)

Email and Security

As we know, it is possible to spoof an email sender’s name, so now the question of how to authenticate the sender has become even more important, since email has been used to send sensitive information. In the recent case of Gov. Sarah Palin’s email, her email account got hacked and the hacker posted the […]

Comments (1)