
7-Zip flaw, CERT-UA impersonation, AI EO revoked
Cybersecurity Headlines
00:00
Exploitation of DNS and Phishing Tactics in Cybersecurity
This chapter examines how a botnet leverages misconfigured DNS records to attack email protection systems and launch phishing campaigns using Zendesk subdomains. It further discusses an IT support scheme leveraging email flooding in Microsoft Teams to distribute malware and compromise data security.
Play episode from 05:19
Transcript


