
Sign up to save your podcasts
Or


Send us fan mail!
Hello to all our Cyber Squirrels! In this extra-packed episode of Discarded, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending against them requires more than just traditional email security.
Jason explains what Direct Send is, why attackers exploit this legacy feature, and how it enables phishing campaigns that appear to originate from inside an organization. From QR code phishing kits to “to-do list” themed lures, Selena and Jason break down attack chains, share real-world examples, and highlight the red flags that indicate exploitation. They also explore how adversaries weaponize URL rewrites in redirect chains, to deliver malware and credential phishing.
We also unpack:
This episode offers a clear, actionable look at how threat actors adapt and why everything old in cybercrime eventually becomes new again.
Resources Mentioned:
https://www.proofpoint.com/us/blog/email-and-cloud-threats/attackers-abuse-m365-for-internal-phishing
http://www.jasonsford.com
https://github.com/jasonsford/directsendanalyzer
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Stay ahead of emerging threats, and subscribe! Happy hunting!
By Proofpoint4.9
5555 ratings
Send us fan mail!
Hello to all our Cyber Squirrels! In this extra-packed episode of Discarded, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending against them requires more than just traditional email security.
Jason explains what Direct Send is, why attackers exploit this legacy feature, and how it enables phishing campaigns that appear to originate from inside an organization. From QR code phishing kits to “to-do list” themed lures, Selena and Jason break down attack chains, share real-world examples, and highlight the red flags that indicate exploitation. They also explore how adversaries weaponize URL rewrites in redirect chains, to deliver malware and credential phishing.
We also unpack:
This episode offers a clear, actionable look at how threat actors adapt and why everything old in cybercrime eventually becomes new again.
Resources Mentioned:
https://www.proofpoint.com/us/blog/email-and-cloud-threats/attackers-abuse-m365-for-internal-phishing
http://www.jasonsford.com
https://github.com/jasonsford/directsendanalyzer
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Stay ahead of emerging threats, and subscribe! Happy hunting!

187 Listeners

373 Listeners

376 Listeners

653 Listeners

1,020 Listeners

320 Listeners

416 Listeners

8,016 Listeners

177 Listeners

315 Listeners

189 Listeners

74 Listeners

136 Listeners

46 Listeners

171 Listeners