Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How Attackers Bypass Synced Passkeys

    October 15, 2025

    Flax Typhoon exploited ArcGIS to gain long-term access

    October 15, 2025

    When Face Recognition Doesn’t Know Your Face Is a Face

    October 15, 2025
    Facebook X (Twitter) Instagram
    Trending
    • How Attackers Bypass Synced Passkeys
    • Flax Typhoon exploited ArcGIS to gain long-term access
    • When Face Recognition Doesn’t Know Your Face Is a Face
    • There’s one critical reason why I choose this Garmin smartwatch over competing models
    • Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
    • The OnePlus 12 is still on sale for $300 off – but time is running out
    • Coinbase boosts investment in India’s CoinDCX, valuing exchange at $2.45B
    • Was ist ein Keylogger?
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»AI»Don’t trust that email: It could be from a hacker using your printer to scam you
    AI

    Don’t trust that email: It could be from a hacker using your printer to scam you

    TechurzBy TechurzJune 27, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Microsoft logo on building
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In the campaign observed by Varonis’ forensics experts, the attacker used PowerShell to send emails that were designed to resemble voicemail notifications which included a PDF attachment with a QR code that redirected users to a site designed to harvest M365 credentials.

    Varonis’ researchers pointed out that the campaign works because no logins or credentials are required, the smart host accepts emails from any external source, the “from” address can be spoofed to any be internal user, and the only requirement is that the recipient is internal to the client organization.

    Further, because it is routed through Microsoft infrastructure and seems to be coming from within the organization, the email bypasses traditional security controls, including Microsoft’s own filtering mechanisms which treat it as internal-to-internal, or third-party tools that flag suspicious messages based on authentication, routing patterns, or sender reputation.

    dont Email Hacker Printer scam trust
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleExtra Clues And Answers For Today’s Game
    Next Article Want fancy floorstanding speakers? These are the best 3 for all budgets
    Techurz
    • Website

    Related Posts

    Security

    Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

    October 14, 2025
    Security

    German state replaces Microsoft Exchange and Outlook with open-source email

    October 13, 2025
    Security

    Unplug Gemini from email and calendars, says cybersecurity firm

    October 9, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    How Attackers Bypass Synced Passkeys

    October 15, 2025

    Flax Typhoon exploited ArcGIS to gain long-term access

    October 15, 2025

    When Face Recognition Doesn’t Know Your Face Is a Face

    October 15, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.