This post will be the first of a series on advanced phishing capabilities and bypassing email security mechanisms. The focus is on URL analysis and bypassing link scanning capabilities, with Microsoft’s O365 linkscanning filters used…
With all the focus on IT security, businesses sometimes forget that not every security breach involves technology. In fact, some of the most successful security breaches don’t involve computers at all.
Throughout our security testing we…