Share your knowledge. It’s a way to achieve immortality. Dalai Lama
Post Views: 32,092
Post Views: 32,092 Let’s start with the most obvious question – why should I try to simulate spam mail? And the answer is – to test our existing mail security infrastructure. In a modern mail environment, the need for implementing some “security mechanism” which will protect our mail infrastructure from spam mail and other threats,…
Post Views: 15,957
Post Views: 15,957 In the following article, we will review how to configure Outlook mail client to connect “Office 365 mailbox” that is hosted on the Exchange Online server by using the IMAP and the SMTP protocol. Generally speaking, Exchange Online provides a variety of methods and protocol, which we can use for connecting to…
Post Views: 62,584
Post Views: 62,584 The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based…
Post Views: 17,091
Post Views: 17,091 The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for…
Post Views: 5,681
Post Views: 5,681 In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story…
Post Views: 7,343
Post Views: 7,343 We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail…
Post Views: 5,539
Post Views: 5,539 The unique character of the spoofing attack is – that the “spoof action”, serves as a spearhead for most of the other mail attacks. In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such as Phishing mail attack or spam mail. Spoof mail…
Post Views: 6,600
Post Views: 6,600 In the current article, we will continue our journey to the land of “mail threats and dangers,” and this time; our primary focus will be on one of the most dangerous and deadly types of mail attack – the Phishing mail attack! The main points that I would like to emphasize regarding…
Post Views: 4,689
Post Views: 4,689 Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some…
Post Views: 5,294
Post Views: 5,294 In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks?…
Post Views: 4,030
Post Views: 4,030 The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular structure and the characters of our defense system, that will need to…
Post Views: 10,365
Post Views: 10,365 Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender identity (check if the sender considers as a legitimate sender of a spoofed sender). Using SPF, DKIM…