The latest Notifiable Data Breaches Quarterly Statistics Report confirms that Australian legal practices are at risk of cybercrime with phishing as the main threat.
Category: Security

Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide)
This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments.

Discovering Hidden Email Gateways with OSINT Techniques
In this article, we elaborate how we managed to identify hidden internal email servers by relying on various open-source intelligence (OSINT) data sources for our direct email spool attack research.

How to Evade Expensive Phishing Filters with One Simple Trick
One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime.

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. This is my up-to-date guide helping you recognise the latest email-based scams.

Why MFA on PEXA (Property Exchange Australia) leaves security concerns?
PEXA (Property Exchange Australia) introduces multi-factor authentication to combat payment redirection fraud but leaves security concerns due to SIM swapping attacks.