
Sign up to save your podcasts
Or


In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360
“EchoSpoofing” — A Massive Phishing Campaign Exploiting...
Spoof intelligence insight - Microsoft Defender for Office 365
How attackers bypass third-party mail filtering to Office 365
Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
By SecurIT3605
1414 ratings
In this episode, Spencer and Brad dive into the complex maze of 3rd party email providers, filtering and spoofing. Email spoofing is a technique used by cybercriminals to disguise the sender's address in an email message, making it appear as though the email originated from a different source. This can be used for a variety of malicious purposes, such as phishing attacks, fraudulent activities, or spreading malware.
DMARC Rundown - Offensive Security Blog - SecurIT360
“EchoSpoofing” — A Massive Phishing Campaign Exploiting...
Spoof intelligence insight - Microsoft Defender for Office 365
How attackers bypass third-party mail filtering to Office 365
Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links
Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

7,589 Listeners

373 Listeners

372 Listeners

653 Listeners

1,024 Listeners

418 Listeners

8,046 Listeners

181 Listeners

314 Listeners

189 Listeners

19 Listeners

74 Listeners

140 Listeners

169 Listeners

4 Listeners