The ROPEMAKER Email Exploit: A Deep Dive
What if a cybercriminal could remotely change the content that you see in your email, whenever they chose? Or even worse, what if they could swap a benign URL with a malicious one in your delivered email or turn simple text into a malicious URL, without needing direct access to your PC or your email application?
If this concerns you, download our latest security advisory for a deep dive into a new email-based attack vector that Mimecast has dubbed, ROPEMAKER. Learn about its origin, how it works and techniques you can apply to defend against it.