The Cyber Threat Perspective cover image

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

The Cyber Threat Perspective

00:00

Exploring Email Security: A Deep Dive into Spoofing

This chapter examines the technical intricacies of email security protocols including SPF, DKIM, and DMARC, and their impact on email verification. It highlights a significant email spoofing incident involving Proofpoint, showcasing how threat actors exploited security configurations to manipulate email authenticity. The discussion also covers the evolution of email filtering and the vulnerabilities introduced with the shift from on-premises to cloud-based systems, emphasizing the need for improved protective measures.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app