Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide)

Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide)

This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments. The post Setting Up an Email Server for the Direct ... Read More
Discovering Hidden Email Gateways with OSINT Techniques

Discovering Hidden Email Gateways with OSINT Techniques

In this article, we elaborate how we managed to identify hidden internal email servers by relying on various open-source intelligence (OSINT) data sources for our direct email spool attack research. The post Discovering Hidden Email Gateways with OSINT Techniques appeared first on Rainbow and Unicorn ... Read More
How to Evade Expensive Phishing Filters with One Simple Trick

How to Evade Expensive Phishing Filters with One Simple Trick

One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime. The post How to Evade Expensive Phishing Filters with One ... Read More
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

| | Cybersecurity, Phishing, security
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. This is my up-to-date guide helping you recognise the latest email-based scams ... Read More
Your Privacy is at Risk

Why MFA on PEXA (Property Exchange Australia) leaves security concerns?

PEXA (Property Exchange Australia) introduces multi-factor authentication to combat payment redirection fraud but leaves security concerns due to SIM swapping attacks. The post Why MFA on PEXA (Property Exchange Australia) leaves security concerns? appeared first on Rainbow and Unicorn ... Read More
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

| | Breach, Cybersecurity, security, technology
How abandoned internet domains are a significant cyber risk which threatens businesses and in particular the Australian legal profession. The post How Abandoned Domain Names Pose a Major Cyber Risk to Your Business appeared first on Rainbow and Unicorn ... Read More
Why You Need Professional Email Hosting for Your Business

Why You Need Professional Email Hosting for Your Business

In this article, we explain how basic email hosting providers can put your business at risk of cyber attacks and why you should consider migrating to a professional email service. The post Why You Need Professional Email Hosting for Your Business appeared first on Rainbow and Unicorn ... Read More
ARNECC, ELN, ELNO, ECNL, PEXA – The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA – The Alphabet of Electronic Conveyancing

In this article, we explain the basics of electronic conveyancing and what cybersecurity challenges other conveyancing platforms were facing overseas. The post ARNECC, ELN, ELNO, ECNL, PEXA – The Alphabet of Electronic Conveyancing appeared first on Rainbow and Unicorn ... Read More
Hacking law firms with abandoned domain names

Hacking law firms with abandoned domain names

| | Breach, legal, Privacy, security, two-factor
This research report demonstrates how domain name abandonment poses a significant cyber threat to the legal profession and other businesses. This report also makes recommendations as to measures legal practices and other businesses can take to stop this threat. The post Hacking law firms with abandoned domain names appeared first ... Read More
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack know as phishing to help commit payment redirection fraud. The post Is Your Conveyancing Practice Secure From Hacking? appeared first ... Read More
Loading...