Cybercriminals have developed a sophisticated method to compromise Microsoft 365 accounts by exploiting link-wrapping services, notably those provided by Proofpoint and Intermedia. This technique involves manipulating the very tools designed to protect users, thereby increasing the effectiveness...
A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
A sophisticated phishing campaign exploiting trusted email security tools has rattled the cybersecurity landscape, exposing a dismally clever strategy that turns protective mechanisms into attack vectors. Between June and July 2025, researchers at Cloudflare uncovered an operation wherein...