John GruberinGitBitWhy You Should Always Scan Links in EmailsEver clicked on a link in an email and wondered if it was really safe? That’s where the link scanner comes in.2d ago2
delivr.toGWT-Assisted HTML SmugglingWe recently published an article on how high-level languages such as Rust could be compiled into WebAssembly binaries and executed natively…Jul 3
Nataliia PodpriatovainmedialessonSafely Analyzing Phishing Emails with Trusted ToolsHave you ever felt that sinking feeling when you realize you might have just opened a phishing email? Welcome to the club! 🎣 It’s like a…Jul 4Jul 4
Kawya De SilvainBug ZeroStep-by-Step Tutorial on Email Header AnalysisEmail header analysis is a crucial aspect of investigating and understanding email communications.May 10, 2023May 10, 2023
Engineering @ SquareXinSquareX LabsStop Malicious Document drops via Spear Phishing mails with SquareXSquareX helps you detect, mitigate and threat-hunt web attacks happening against your employees in real timeJun 24Jun 24
John GruberinGitBitWhy You Should Always Scan Links in EmailsEver clicked on a link in an email and wondered if it was really safe? That’s where the link scanner comes in.2d ago2
delivr.toGWT-Assisted HTML SmugglingWe recently published an article on how high-level languages such as Rust could be compiled into WebAssembly binaries and executed natively…Jul 3
Nataliia PodpriatovainmedialessonSafely Analyzing Phishing Emails with Trusted ToolsHave you ever felt that sinking feeling when you realize you might have just opened a phishing email? Welcome to the club! 🎣 It’s like a…Jul 4
Kawya De SilvainBug ZeroStep-by-Step Tutorial on Email Header AnalysisEmail header analysis is a crucial aspect of investigating and understanding email communications.May 10, 2023
Engineering @ SquareXinSquareX LabsStop Malicious Document drops via Spear Phishing mails with SquareXSquareX helps you detect, mitigate and threat-hunt web attacks happening against your employees in real timeJun 24
Pradeep GuptaEmail Header AnalysisEmail header analysis is the process of inspecting the header information of an email message to learn more about its origin, path, and…Jul 4, 20231
Enda - The IT GuyIs Someone Snooping in Your Inbox?Do you ever get the nagging suspicion that someone, somewhere, might be peeking into your emails? You probably envision nefarious hackers…Jun 12
delivr.todelivr.to’s Top 10 Payloads (May ‘24): Auth Coercion, BYOI and Esoteric ContainersThe latest installment of delivr.to’s Top 10. SMB auth coercion, 3rd party script interpreters used for process injection & esoteric…May 28