Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
36 résultats taggé Email  ✕
Microsoft 365 'Direct Send' abused to send phishing as internal users https://www.bleepingcomputer.com/news/security/microsoft-365-direct-send-abused-to-send-phishing-as-internal-users/
26/06/2025 15:03:13
QRCode
archive.org
thumbnail

An ongoing phishing campaign abuses a little‑known feature in Microsoft 365 called "Direct Send" to evade detection by email security and steal credentials.

Direct Send is a Microsoft 365 feature that allows on‑premises devices, applications, or cloud services to send emails through a tenant's smart host as if they originated from the organization's domain. It’s designed for use by printers, scanners, and other devices that need to send messages on behalf of the company.

However, the feature is a known security risk, as it doesn't require any authentication, allowing remote users to send internal‑looking emails from the company's domain.

Microsoft recommends that only advanced customers utilize the feature, as its safety depends on whether Microsoft 365 is configured correctly and the smart host is properly locked down..

"We recommend Direct Send only for advanced customers willing to take on the responsibilities of email server admins," explains Microsoft.

"You need to be familiar with setting up and following best practices for sending email over the internet. When correctly configured and managed, Direct Send is a secure and viable option. But customers run the risk of misconfiguration that disrupts mail flow or threatens the security of their communication."

The company has shared ways to disable the feature, which are explained later in the article, and says they are working on a way to deprecate the feature.

bleepingcomputer EN 2025 Credentials Direct-Send Email Microsoft Microsoft-365 Phishing
Hackers take aim at Washington Post journalists in an apparent ‘targeted’ cyberattack | CNN Business https://edition.cnn.com/2025/06/15/media/washington-post-cyberback-emails
16/06/2025 13:54:46
QRCode
archive.org
thumbnail

Hackers have tried to break into the email accounts of a select number of Washington Post journalists, according to an internal Washington Post memo obtained by CNN.

The Post discovered the “possible targeted” hack of its email system last Thursday, prompting the newspaper to reset login credentials for all its employees on Friday, Washington Post Executive Editor Matt Murray said in a memo Sunday to employees.

“Although our investigation is ongoing, we believe the incident affected a limited number of Post journalists accounts, and we have contacted those whose accounts have been impacted,” Murray said.

“We do not believe this unauthorized intrusion impacted any additional Post systems or has had any impact for our customers,” he added.

It was not immediately clear who was responsible for the hack. Journalists are regular targets for both state-backed spies, who are interested in tracking their reporting before it becomes public, and cybercriminals, who are interested in extorting news organizations.

A spokesperson for The Post declined to comment when asked who might be responsible for the hack.

CNN EN 2025 Washington-Post email accounts targeted-hack incident
Trump's sanctions on ICC prosecutor have halted tribunal's work https://apnews.com/article/icc-trump-sanctions-karim-khan-court-a4b4c02751ab84c09718b1b95cbd5db3
16/05/2025 11:16:55
QRCode
archive.org
thumbnail

The International Criminal Court ’s chief prosecutor has lost access to his email, and his bank accounts have been frozen.

The Hague-based court’s American staffers have been told that if they travel to the U.S. they risk arrest.

Some nongovernmental organizations have stopped working with the ICC and the leaders of one won’t even reply to emails from court officials.

Those are just some of the hurdles facing court staff since U.S. President Donald Trump in February slapped sanctions on its chief prosecutor, Karim Khan, according to interviews with current and former ICC officials, international lawyers and human rights advocates.

The sanctions will “prevent victims from getting access to justice,” said Liz Evenson, international justice director at Human Rights Watch.

Trump sanctioned the court after a panel of ICC judges in November issued arrest warrants for Israeli Prime Minister Benjamin Netanyahu and his former defense minister, Yoav Gallant.

Judges found there was reason to believe that the pair may have committed war crimes by restricting humanitarian aid and intentionally targeting civilians in Israel’s campaign against Hamas in Gaza — charges Israeli officials deny.
One reason the the court has been hamstrung is that it relies heavily on contractors and non-governmental organizations. Those businesses and groups have curtailed work on behalf of the court because they were concerned about being targeted by U.S. authorities, according to current and former ICC staffers.

Microsoft, for example, cancelled Khan’s email address, forcing the prosecutor to move to Proton Mail, a Swiss email provider, ICC staffers said. His bank accounts in his home country of the U.K. have been blocked.

Microsoft did not respond to a request for comment.

Staffers at an NGO that plays an integral role in the court’s efforts to gather evidence and find witnesses said the group has transferred money out of U.S. bank accounts because they fear it might be seized by the Trump administration.

apnews.com EN 2025 Donald-Trump NGO US Microsoft ICC email address blocked
OCC Notifies Congress of Incident Involving Email System https://occ.gov/news-issuances/news-releases/2025/nr-occ-2025-30.html
13/04/2025 10:46:08
QRCode
archive.org
thumbnail

The Office of the Comptroller of the Currency (OCC) today notified Congress of a major information security incident, as required by the Federal Information Security Modernization Act.

This finding is the result of internal and independent third-party reviews of OCC emails and email attachments that were subject to unauthorized access. On February 11, 2025, the OCC learned of unusual interactions between a system administrative account in its office automation environment and OCC user mailboxes. On February 12, the OCC confirmed the activity was unauthorized and immediately activated its incident response protocols which include initiating an independent third-party incident assessment and reporting the incident to the Cybersecurity and Infrastructure Security Agency. On February 12, the OCC disabled the compromised administrative accounts and confirmed that the unauthorized access had been terminated. The OCC provided public notice of the incident on February 26.

occ.gov EN 2025 US OCC Currency Email System mailboxes hacked release
Fremdzugriff auf ein E-Mail-Konto der kantonalen Verwaltung Appenzell I.Rh. — Appenzell Innerrhoden https://www.ai.ch/verwaltung/finanzdepartement/aktuelles/fremdzugriff-auf-ein-e-mail-konto-der-kantonalen-verwaltung-appenzell-i-rh
01/03/2025 10:01:51
QRCode
archive.org
thumbnail

Unbekannte sind in das Mailkonto von Säckelmeister Ruedi Eberle eingedrungen. Dank des Sicherheitssystems konnte eine Weiterverbreitung rasch unterbunden werden. Nach aktuellem Stand sind weder Daten verloren gegangen noch weitere Konten der kantonalen Verwaltung betroffen.

ai.ch DE Appenzell E-Mail-Konto Switzerland CH hacked email
Orange Group confirms breach after hacker leaks company documents https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/
26/02/2025 13:56:16
QRCode
archive.org
thumbnail

A hacker claims to have stolen thousands of internal documents with user records and employee data after breaching the systems of Orange Group, a leading French telecommunications operator and digital service provider.
#Breach #Computer #Data #Email #Extortion #InfoSec #Jira #Leak #Orange #Ransom #S.A. #Security

Extortion Leak Security InfoSec Orange Breach Ransom Data Computer Email S.A Jira
Microsoft 365 Admin portal abused to send sextortion emails https://www.bleepingcomputer.com/news/security/microsoft-365-admin-portal-abused-to-send-sextortion-emails/
20/11/2024 21:47:56
QRCode
archive.org
thumbnail

The Microsoft 365 Admin Portal is being abused to send sextortion emails, making the emails appear trustworthy and bypassing email security platforms.

bleepingcomputer EN 2024 Email Extortion Mail-Filters Microsoft-365 Microsoft-365-Admin-Portal Sextortion Security InfoSec Computer-Security
Hackers exploit Roundcube webmail flaw to steal email, credentials https://www.bleepingcomputer.com/news/security/hackers-exploit-roundcube-webmail-flaw-to-steal-email-credentials/
22/10/2024 14:48:04
QRCode
archive.org
thumbnail

Threat actors have been exploiting a vulnerability in the Roundcube Webmail client to target government organizations in the Commonwealth of Independent States (CIS) region, the successor of the former Soviet Union.

bleepingcomputer EN 2024 Actively-Exploited CVE-2024-37383 Cross-Site-Scripting Email Roundcube Vulnerability XSS
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52
14/10/2024 08:59:24
QRCode
archive.org
thumbnail

1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md

hackermondev EN 2024 Zendesk email spoofing
Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam https://blog.talosintelligence.com/simple-mail-transfer-pirates/
27/09/2024 09:25:36
QRCode
archive.org
thumbnail

Many spammers have elected to attack web pages and mail servers of legitimate organizations, so they may use these “pirated” resources to send unsolicited email.

talosintelligence EN 2024 spam unsolicited email Techniques hird-party infrastructure
Critical Exim bug bypasses security filters on 1.5 million mail servers https://www.bleepingcomputer.com/news/security/critical-exim-bug-bypasses-security-filters-on-15-million-mail-servers/
13/07/2024 00:38:28
QRCode
archive.org
thumbnail

Censys warns that over 1.5 million Exim mail transfer agent (MTA) instances are unpatched against a critical vulnerability that lets threat actors bypass security filters.

bleepingcomputer EN 2024 Bypass Email Exim Mail Security-Bypass Vulnerability
Security bug allows anyone to spoof Microsoft employee emails https://techcrunch.com/2024/06/18/security-bug-allows-anyone-to-spoof-microsoft-employee-emails/
19/06/2024 08:47:58
QRCode
archive.org
thumbnail

A researcher has found a way to impersonate Microsoft corporate email accounts, which could make phishing attacks harder to spot.

techcrunch EN 2024 microsoft researcher bug email phishing
Telegram Combolists and 361M Email Addresses https://www.troyhunt.com/telegram-combolists-and-361m-email-addresses/
03/06/2024 21:48:52
QRCode
archive.org
thumbnail

Last week, a security researcher sent me 122GB of data scraped out of thousands of Telegram channels. It contained 1.7k files with 2B lines and 361M unique email addresses of which 151M had never been seen in HIBP before. Alongside those addresses were passwords and, in many cases, the website the data pertains to. I've loaded it into Have I Been Pwned (HIBP) today because there's a huge amount of previously unseen email addresses and based on all the checks I've done, it's legitimate data. That's the high-level overview, now here are the details:

troyhunt EN 2024 Telegram Combolists 361M Email Addresses 122GB HIBP infostealer
Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR https://asec.ahnlab.com/en/65399/
14/05/2024 10:18:00
QRCode
archive.org
thumbnail

There are two types of malicious documents that are distributed via email recently: those exploiting equation editor and those including external link URLs. This post will describe the infection flow of the DanaBot malware that is distributed through documents containing external links, the latter method, as well as the evidence and detection process with the AhnLab EDR product’s diagram. Figure 1 shows the content of a spam email with a Word document attached that contains an external link. As you can see, it is a sophisticatedly disguised email pretending to be a job application form to deceive the recipient. The attached file (.docx) is a Word document that contains an external link.

ahnlab EN 2024 DanaBot email Word
CISA: Email from federal agencies possibly accessed in Russian breach of Microsoft https://therecord.media/cisa-microsoft-breach-emergency-directive
15/04/2024 16:35:25
QRCode
archive.org
thumbnail

CISA publicly released an emergency directive issued to federal agencies earlier this month, detailing how a breach at Microsoft could have affected the government.

therecord EN 2024 CISA Microsoft Breach government email
Kobold letters https://lutrasecurity.com/en/articles/kobold-letters/
04/04/2024 20:29:04
QRCode
archive.org
thumbnail

Anyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious security risk.

lutrasecurity email EN 2024 HTML Kobold-letters
Microsoft could have prevented Chinese cloud email hack, US cyber report says https://www.theverge.com/2024/4/3/24119787/microsoft-cloud-email-hack-china-us-cyber-report
03/04/2024 22:54:04
QRCode
archive.org
thumbnail

Microsoft needs a security culture overhaul, a US report concludes. The software giant could have prevented a cloud email hack in 2023.

theverge EN 2024 Microsoft cloud email cascade-of-security-failures Storm0558 DHS
AI will make scam emails look genuine, UK cybersecurity agency warns https://www.theguardian.com/technology/2024/jan/24/ai-scam-emails-uk-cybersecurity-agency-phishing
24/01/2024 21:36:36
QRCode
archive.org
thumbnail

NCSC says generative AI tools will soon allow amateur cybercriminals to launch sophisticated phishing attacks

theguardian EN 2023 AI scam phishing email gebuine cybercriminals warning UK NCSC
Microsoft network breached through password-spraying by Russian-state hackers https://arstechnica.com/security/2024/01/microsoft-network-breached-through-password-spraying-by-russian-state-hackers/
20/01/2024 10:03:08
QRCode
archive.org
thumbnail

Senior execs' emails accessed in network breach that wasn't caught for 2 months.

arstechnica en 2024 Microsoft email theft Russia APT29 breached password-spray
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware https://thehackernews.com/2023/12/hackers-exploiting-old-ms-excel.html?m=1
21/12/2023 19:57:57
QRCode
archive.org
thumbnail

Beware of phishing emails with invoice-themed attachments! Attackers are using an old Office vulnerability (CVE-2017-11882) to spread the Agent Tesla

thehackernews EN 2023 malware Agent-Tesla CVE-2017-11882 phishing email MSExcel Excel vulnerability
page 1 / 2
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio