
Sign up to save your podcasts
Or


In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360
“EchoSpoofing” — A Massive Phishing Campaign Exploiting...
Spoof intelligence insight - Microsoft Defender for Office 365
How attackers bypass third-party mail filtering to Office 365
Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.
By SecurIT3605
1414 ratings
In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360
“EchoSpoofing” — A Massive Phishing Campaign Exploiting...
Spoof intelligence insight - Microsoft Defender for Office 365
How attackers bypass third-party mail filtering to Office 365
Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.

2,003 Listeners

370 Listeners

373 Listeners

638 Listeners

1,016 Listeners

322 Listeners

415 Listeners

8,001 Listeners

175 Listeners

313 Listeners

188 Listeners

73 Listeners

99 Listeners

134 Listeners

169 Listeners