And that's a wrap! The maximum score on today's #SpotThePhish is 15. How did you do?
Did I miss any? Reply and let us know!
🧵 12/12
#infosec #phishing #SecurityAwareness
It's time for today's edition of #SpotThePhish! Can you spot the many tells in this very bad phishing email that made it through my spam filters today? Spoilers in the replies, so write down your answers before reading on so you can score yourself.
🧵 1/?
#phishing #infosec #securityAwareness

Phishing attacks are getting smarter, but you can stay ahead. In the final part of Rachel Rabin’s blog series, find practical advice to spot and stop email threats in Microsoft 365: https://www.pentestpartners.com/security-blog/bec-ware-the-phish-part-3-detect-and-prevent-incidents-in-m365/

Here’s what’s inside:

šŸ”Understanding how phishing emails bypass existing controls and fine-tune your anti-malware policies.

šŸ“Š Configure Defender for Office and Defender for Cloud Apps with customised threat and alert policies to effectively prevent and detect email-based attacks.

⚔ Go beyond default settings—use KQL to identify noisy policies and refine rule scope or sensitivity for better precision.

#PhishingPrevention #EmailSecurity #Microsoft365 #CyberThreats #CyberSecurityTips #StaySecure #PhishingAwareness #M365Security #CyberResilience #SpotThePhish

BEC-ware the Phish (part 3): Detect and Prevent Incidents in M365 | Pen Test Partners

TL;DR Take lessons learned from investigation, such as reviewing how emails evaded existing phishing controls to update anti-malware policies. Configure Defender for Office and Defender for Cloud Apps threat and alert policies to prevent and detect email-based attacks. Don’t rely on out-of-the-box (OOTB) configuration, use KQL to identify noisy polices and adjust rule scope or

FINALLY, truth in advertising #SpotThePhish 🐟