Get a Pentest and security assessment of your IT network.

Cyber Security

Phishers count on remotely hosted images to bypass email filters

Phishers are using remote images instead of embeedding them directly into emails to bypass email filters. Remote images are hosted on the web and need to be fetched before being analyzed. To delay the fetching, phishers are employing multiple redirections, cloaking techniques, and are hosting the images on high-reputation domains. The use of JavaScript is also common so that it is necessary for security vendors to use state of the art web crawlers that are more difficult to scale.

Source: https://www.helpnetsecurity.com/2021/01/15/phishers-bypass-email-filters/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security