Security compromises occur as a result of bad actors exploiting known vulnerabilities within your network and software related to your email sending infrastructure or website.
Common causes of security compromises include:
- Open relays: An infrastructure vulnerability allowing a third party to send email from your IP address.
- Brute force attacks: A website vulnerability allowing weak password requirements within your network to be exploited, giving spammers access to your email server.
- Web form abuse: A website vulnerability allowing malicious website links to be placed on your website. The malicious website usually contains malware that, when downloaded, provides a spammer access to your network.
- Malware: When someone clicks on a link or downloads content within a malicious email, it may contain malware or trojans. When that content is downloaded, it provides a spammer access to your network.