• Cyber Safety
  • Posts
  • Conversations Compromised: Email Threads, Screenshots & Scripted Logins

Conversations Compromised: Email Threads, Screenshots & Scripted Logins

In partnership with

 

Master ChatGPT for Work Success

ChatGPT is revolutionizing how we work, but most people barely scratch the surface. Subscribe to Mindstream for free and unlock 5 essential resources including templates, workflows, and expert strategies for 2025. Whether you're writing emails, analyzing data, or streamlining tasks, this bundle shows you exactly how to save hours every week.

Internal Email Threads Are Being Poisoned Mid-Conversation

Attackers are replying to real threads via spoofed domains—joining active discussions between finance, HR, or legal teams with subtle message inserts.

Train users to re-check sender domains even mid-thread. Use color-coded domain flags in email clients and alert on reply-to/header mismatch.

“Do Not Disturb” Modes Are Delaying Critical Security Alerts

Push-based security notifications (e.g., login attempts, policy changes, anomaly detection) are being missed because employees have DND modes enabled on mobile and desktop.

Add persistent banners for critical alerts. Use secondary channels (SMS, Slack, email) for out-of-band confirmations.

Certain low-cost SaaS apps are reusing link formats for password resets, creating universal reset URLs vulnerable to token prediction and phishing.

Rotate reset tokens every few minutes. Validate expiration against IP and device fingerprint, and never reuse reset formats.

Shared Screenshots Are Exposing Internal URLs

Employees regularly share screenshots of internal dashboards, previews, or browser tabs that contain identifiable URLs, tokens, or session paths—especially in bug reports and presentations.

Deploy image scrubbing for internal tools. Blur or block content by element class, and educate teams on redaction tools.

Office Equipment Is Still Accessible Over Wi-Fi

Badge readers, printers, and camera systems are often discoverable on office Wi-Fi or via multicast DNS—offering lateral movement opportunities post-access.

Segment all physical equipment on isolated VLANs. Block SSDP, mDNS, and UPnP across Wi-Fi networks.

“Secure” Login Pages Still Allow Third-Party Scripts

Login forms sometimes embed analytics or A/B testing scripts from vendors—enabling session leakage, credential scraping, or full DOM mirroring.

Audit all login pages for third-party scripts. Enforce CSP headers and isolate authentication flows from marketing pixels or external JS.