RavenMail Security’s Post

Demo Attack #4: Often SoC teams block malicious IP addresses, but this can be by-passed by using masking your real IP using a TOR network. Here's a short explainer on how threat actors use ToR to send mail and by-pass traditional mail security To view on YouTube: https://lnkd.in/gX-GZAir #EmailSecurity

To view or add a comment, sign in

Explore topics