Phishing and Outlook Rules

Sign in to queue

Description

Criminals are using Outlook rules to create email box proxies, effectively gaining persistence and stealth. Here's how.

Tag:

Security

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents