Network Security IP Spoofing Attack Tried to Disrupt Tor Network A coordinated IP spoofing attack that involved port scans tried to disrupt the Tor network by getting relays on blocklists. Eduard KovacsNovember 12, 2024
Email Security Vulnerabilities Enable Attackers to Spoof Emails From 20 Million Domains Vulnerabilities in hosted email services allow attackers to spoof the identity of senders, bypassing security measures. Ionut ArghireJuly 31, 2024
Email Security Phishing Campaign Exploited Proofpoint Email Protections for Spoofing Threat actors have exploited Proofpoint’s email protection service to deliver millions of spoofed phishing emails. Ionut ArghireJuly 29, 2024
Email Security SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms. Eduard KovacsDecember 18, 2023