Sec Feed Reader
  • Alle Eintraege
  • CVEs
  • Dashboards
    Uebersicht ISO 27001
  • Filter
  • Quellen
  • Bookmarks
  • Suche

Simple bypass of the link preview function in Outlook Junk folder, (Thu, May 14th)

Veroeffentlicht: 2026-05-14 06:08 UTC Importiert: 2026-05-14 22:15 UTC Quelle-ID: sans_isc uid_hash: 713f542fb70db7c3d0706ecf74a5bb3155f39ca9b5b762611faab6cc96672160
SANS Internet Storm Center
Besides serving as a place where Microsoft Outlook places suspected spam, the Outlook Junk folder has one additional function that can be quite helpful when it comes to identifying malicious messages. Any e-mail placed in this folder is stripped of all formatting, and destinations of all links included in the message become visible to the user, as you can see in the following images which show the same e-mail when it is placed in the inbox, and when it is placed in the Junk folder.

Inhalt

No data

Quellen-Details

ID Name Kategorie Tags Zielgruppe Sprache Feed-URL
sans_isc

SANS Internet Storm Center

security_news - de https://isc.sans.edu/rssfeed.xml
Zurueck zur Eintrags-Liste

Aggregator ยท SQLPage + PostgreSQL