Source |
SecurityWeek |
Identifiant |
4043582 |
Date de publication |
2022-01-27 21:09:04 (vue: 2022-01-27 22:08:18) |
Titre |
Outlook Security Feature Bypass Allowed Sending Malicious Links |
Texte |
A Trustwave researcher has discovered a new technique to completely bypass a security feature of Microsoft Outlook and deliver a malicious link to the recipient.
The new technique, Trustwave SpiderLabs lead threat architect Reegun Richard Jayapaul explains, is a variation of a vulnerability that was initially addressed in February 2020.
|
Notes |
|
Envoyé |
Oui |
Condensat |
2020 addressed allowed architect bypass completely deliver discovered explains feature february has initially jayapaul lead link links malicious microsoft new outlook recipient reegun researcher richard security sending spiderlabs technique threat trustwave variation vulnerability |
Tags |
Vulnerability
Threat
Guideline
|
Stories |
|
Move |
|
Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2022-01-28 10:19:04 |
(Déjà vu) Experts devise a technique to bypass Microsoft Outlook Security feature (lien direct) |
A researcher devised a technique to bypass a security feature of Microsoft Outlook and deliver a malicious link to the recipient. Reegun Richard Jayapaul, SpiderLabs lead threat architect at Trustwave, has devised a technique to bypass a security feature of Microsoft Outlook and deliver a malicious link to the recipient. While investigating a malware campaign, […]
|
Malware
Threat
Guideline
|
|
|