fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.6K
active users

#emailspoofing

0 posts0 participants0 posts today
ResearchBuzz: Firehose<p>Bleeping Computer: Phishers abuse Google OAuth to spoof Google in DKIM replay attack. “In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google’s systems, passing all verifications but pointing to a fraudulent page that collected logins. The attacker leveraged Google’s infrastructure to trick recipients into accessing […]</p><p><a href="https://rbfirehose.com/2025/04/21/bleeping-computer-phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/" class="" rel="nofollow noopener" target="_blank">https://rbfirehose.com/2025/04/21/bleeping-computer-phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/</a></p>
Techy Geek :verified:<p>A critical unpatched bug allows anyone to impersonate Microsoft corporate email accounts, enabling phishing attacks. The researcher who discovered it reported it to Microsoft, but they couldn't reproduce the issue. It remains unaddressed, posing risks of exploitation by threat actors. 😬</p><p><a href="https://infosec.exchange/tags/MicrosoftBug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftBug</span></a> <br><a href="https://infosec.exchange/tags/EmailSpoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSpoofing</span></a> <br><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <br><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p><p><a href="https://securityaffairs.com/164675/hacking/expert-warns-of-a-spoofing-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/164675/hac</span><span class="invisible">king/expert-warns-of-a-spoofing-bug.html</span></a></p>
Darren Di Lieto<p>This website is terrific! It helped me troubleshoot an email issue that had been plaguing me for months. I wish I'd run across the site sooner. It's an integral part of my toolbox now.</p><p><a href="https://www.learndmarc.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">learndmarc.com</span><span class="invisible"></span></a></p><p><a href="https://illo.social/tags/DMARC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DMARC</span></a> <a href="https://illo.social/tags/EmailSpoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSpoofing</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 SMTP Smuggling Unveils New Email Spoofing Threats 🚨"</p><p>Research by Timo Longin and SEC Consult has uncovered a new vulnerability in the SMTP (Simple Mail Transfer Protocol) known as SMTP Smuggling. This method exploits differences in protocol interpretation, enabling attackers to send spoofed emails from any domain, bypassing SPF checks. Notably, vulnerabilities were identified in Microsoft and GMX, which were promptly addressed. However, SEC Consult advises companies using Cisco Secure Email to manually update their vulnerable default configurations. It's a game-changer in email security, affecting millions of domains and SMTP servers, including major players like Microsoft and GMX. Companies using Cisco Secure Email need urgent updates to their default configurations. Stay vigilant, folks! 🔍💻</p><p><a href="https://infosec.exchange/tags/SMTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMTP</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/EmailSpoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSpoofing</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/SECConsult" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SECConsult</span></a> <a href="https://infosec.exchange/tags/TimoLongin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TimoLongin</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/GMX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GMX</span></a> <a href="https://infosec.exchange/tags/CiscoSecureEmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CiscoSecureEmail</span></a></p><p><a href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/" rel="nofollow noopener" target="_blank">Source</a></p>
Chris Meyer<p>Email spoofing vulnerabilities based on forwarding, from <a href="https://mastodon.social/tags/UCSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UCSD</span></a> researchers.</p><p><a href="https://today.ucsd.edu/story/forwarding_based_spoofing" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">today.ucsd.edu/story/forwardin</span><span class="invisible">g_based_spoofing</span></a></p><p><a href="https://mastodon.social/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a></p>
Bishop Fox<p>Is your <a href="https://infosec.exchange/tags/domain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domain</span></a> susceptible to <a href="https://infosec.exchange/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a>? Find out using the tool Spoofy! </p><p>Read about the origins of this tool and how it checks whether a list of domains (in bulk) can be spoofed based on <a href="https://infosec.exchange/tags/SPF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SPF</span></a> &amp; <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DMARC</span></a> records. <a href="https://bfx.social/3wOngXu" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3wOngXu</span><span class="invisible"></span></a></p>
Bishop Fox<p>In preparation for today's <a href="https://infosec.exchange/tags/ToolTalk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToolTalk</span></a>, check out this write-up on the <a href="https://infosec.exchange/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a> tool Spoofy! <a href="https://bfx.social/3wOngXu" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3wOngXu</span><span class="invisible"></span></a></p>
OPSEC Cybersecurity News Live<p>I clicked what looked like an Amazon email, but it (maybe) was from an Amazon affiliate. Ended up at Amazon.com anyway. Can I safely investigate? <br> <br> <a href="https://security.stackexchange.com/questions/268037/i-clicked-what-looked-like-an-amazon-email-but-it-maybe-was-from-an-amazon-af" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.stackexchange.com/que</span><span class="invisible">stions/268037/i-clicked-what-looked-like-an-amazon-email-but-it-maybe-was-from-an-amazon-af</span></a> <br> <br> <a href="https://aspiechattr.me/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a> <a href="https://aspiechattr.me/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://aspiechattr.me/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://aspiechattr.me/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://aspiechattr.me/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
OPSEC Cybersecurity News Live<p>"Undelivered Mail" I never sent (after registration on website) <br> <br> <a href="https://security.stackexchange.com/questions/267390/undelivered-mail-i-never-sent-after-registration-on-website" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.stackexchange.com/que</span><span class="invisible">stions/267390/undelivered-mail-i-never-sent-after-registration-on-website</span></a> <br> <br> <a href="https://aspiechattr.me/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a> <a href="https://aspiechattr.me/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> <a href="https://aspiechattr.me/tags/dmarc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dmarc</span></a></p>
ITSEC News<p>Airline DMARC Policies Lag, Opening Flyers to Email Fraud - Up to 61 percent out of the IATA (International Air Transport Association) airline members do not ... <a href="https://threatpost.com/airline-dmarc-policies-lag-opening-flyers-to-email-fraud/158449/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/airline-dmarc-p</span><span class="invisible">olicies-lag-opening-flyers-to-email-fraud/158449/</span></a> <a href="https://schleuss.online/tags/domain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domain</span></a>-basedmessageauthentication <a href="https://schleuss.online/tags/reporting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reporting</span></a>&amp;conformance <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/emailspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailspoofing</span></a> <a href="https://schleuss.online/tags/airtransport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airtransport</span></a> <a href="https://schleuss.online/tags/websecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websecurity</span></a> <a href="https://schleuss.online/tags/emailfraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailfraud</span></a> <a href="https://schleuss.online/tags/airlines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airlines</span></a> <a href="https://schleuss.online/tags/dmarc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dmarc</span></a> <a href="https://schleuss.online/tags/iata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iata</span></a></p>