All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.
Identity: Brockman\483548\1750939 Subject: Pharmacy cheap medications Internet Message ID: <email@example.com> From Address: firstname.lastname@example.org Status: Ready Size (KB): 1 Message Source Name: SMTP:Default BROCKMAN Source IP: 184.108.40.206 SCL: 9 Date Received: 9/2/2014 1:29:21 PM Expiration Time: 9/4/2014 1:29:21 PM Last Error: Queue ID: Brockman\483548 Recipients: email@example.com (domain is mine but that account does not exist)
|Exchange 2010 - determine what end user device is connected to exchange||3||18|
|EE experience on sites similar to VirusTotal?||4||30|
|Search Outlook Items||13||27|
|Voting buttons for external recipients - Outlook 2013 to 2010||4||16|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
14 Experts available now in Live!