---
title: "Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit | DMARC Report"
description: "Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit from DMARC Report explains practical steps for email authentication, domain."
image: "https://dmarcreport.com/og/blog/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit.png"
canonical: "https://dmarcreport.com/blog/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/"
---

Quick Answer

The three core email authentication standards - SPF (RFC 7208), DKIM (RFC 6376), and DMARC (RFC 7489) - work together to verify that an email genuinely originates from the domain it claims to represent. DMARC Report Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fmcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Mcdonald%E2%80%99s%20Application%20Tips%2C%20Ingram%20Micro%20Recovers%2CGemini%20Email%20Exploit&url=undefined%2Fblog%2Fmcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fmcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fmcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit%2F&title=Mcdonald%E2%80%99s%20Application%20Tips%2C%20Ingram%20Micro%20Recovers%2CGemini%20Email%20Exploit "Share on Reddit") [ ](mailto:?subject=Mcdonald%E2%80%99s%20Application%20Tips%2C%20Ingram%20Micro%20Recovers%2CGemini%20Email%20Exploit&body=Check out this article: undefined%2Fblog%2Fmcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit%2F "Share via Email") 

![Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![Dmarc analyzer 5332 150x150](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-analyzer-5332-150x150.jpg) 

> The organizations that invest in email authentication early save themselves from expensive incidents later, says Vasile Diaconu, Operations Lead at DuoCircle. We see the pattern constantly: a domain gets spoofed, customers lose trust, and the remediation effort costs 10x what proactive DMARC setup would have cost.

The three core email authentication standards - SPF ([RFC 7208](https://datatracker.ietf.org/doc/html/rfc7208)), DKIM ([RFC 6376](https://datatracker.ietf.org/doc/html/rfc6376)), and DMARC ([RFC 7489](https://datatracker.ietf.org/doc/html/rfc7489)) - work together to verify that an email genuinely originates from the domain it claims to represent. DMARC Report

Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-29598">
						<source src="https://media.mailhop.org/dmarcreport/images/2025/07/Mcdonalds-Application-Tips-Ingram-Micro-RecoversGemini-Email-Exploit.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M17S">2:17</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-29598" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-29598" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-29598" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-29598" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/&t=Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/&url=Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2025/07/Mcdonalds-Application-Tips-Ingram-Micro-RecoversGemini-Email-Exploit.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/" class="input-link input-link-29598" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-29598" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-29598” readonly/>

```
					<button class="copy-embed copy-embed-29598" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

Hey folks! It’s week 3, and we hope you have managed to survive the malicious intentions of threat actors around you. You see, only practicing [cyber hygiene](https://www.k12dive.com/news/powerschool-data-breach-lawsuits-negligence/737900/) and having \*\*cyber awareness can help you in this era of sophisticated [cyberattacks](https://www.cybersecuritydive.com/news/ahold-delhaize-usa-cyberattack-grocery-personal-data-exposed/752053/).

We are back again with our weekly dose of cyber updates. This time, we will discuss McDonald’s massive security incident, talk about \*\*Google Gemini’s ability to generate legitimate-looking [malicious email](https://www.securitymagazine.com/articles/100687-the-last-six-months-shows-a-341-increase-in-malicious-emails) summaries, and focus on how Ingram Micro is slowly getting back on track.

Let’s get started with the details that matter!

![Dmarc record](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-record-4054.jpg) 

## See this if you’re planning to apply at McDonald’s!

One of the most popular fast food joints across the globe, McDonald’s experienced a massive cyber mishap this June, when thousands of applicants used McHire to apply for work at [McDonald’s](https://www.bleepingcomputer.com/news/security/123456-password-exposed-chats-for-64-million-mcdonalds-job-chatbot-applications/). _The cyber incident took place because of the flaws in McHire, the hiring platform used by McDonald’s_.

Security experts \*\*Sam Curry and Ian Carroll have detected a couple of flaws in the platform. They tested the chatbot (Olivia) associated with McHire and found out that with the help of default credentials “**123456**” in passwords and usernames, one can easily access the admin interface of restaurant owners. Further, backed by [IDOR](https://www.varonis.com/blog/what-is-idor-insecure-direct-object-reference) or [API](https://www.ibm.com/think/topics/api), one can conveniently access any inbox to gain access to the personal data of 64 million applicants.

![Gmail dmarc](https://media.mailhop.org/dmarcreport/images/2025/07/gmail-dmarc-1369.jpg) 

The [leaked data](https://www.usatoday.com/story/tech/2025/06/21/aflac-data-leak-cyber-attack-breach-hack/84301222007/) includes highly sensitive information such as email addresses, residential addresses, names, phone numbers, candidacy statuses, and more.

The two security experts informed McDonald’s and [Paradox.ai](http://paradox.ai), the developer of the chatbot Olivia, about the flaw. Within two hours of reporting, McDonald’s changed the default credentials. As of now, there’s no evidence indicating that [threat actors](https://cybersecuritynews.com/iranian-threat-actors-attacking-u-s-critical-infrastructure/) have attempted to access the data of 64 million applicants.

This blunder comes with a few critical cyber lessons:

## 1\. Make sure you change your default credentials

Never use your default password. Change it to create a \*\*strong password that cannot be easily penetrated or cracked for [malicious purposes](https://www.reuters.com/world/china/openai-finds-more-chinese-groups-using-chatgpt-malicious-purposes-2025-06-05/).

## 2\. Secure your LLM

[LLMs](https://www.techtarget.com/whatis/definition/large-language-model-LLM) should be equipped with limited capabilities to minimize the risk of compromise and subsequent rogue incidents.

## Ingram Micro is finally getting back on track after the cyberattack!

Here’s the good news for Ingram Micro customers!

Their website is up and running once again.

Ingram Micra experienced a [ransomware attack](https://www.aljazeera.com/economy/2024/12/10/us-sanctions-china-cyber-firm-for-potentially-deadly-ransomware-attack) on July 4th, just before the holiday weekend began. They are working closely with team members and other authorities to cope with the cyber mishap. The IT distributor giant is right now trying its best to cater to the needs and expectations of its customers and other significant stakeholders.

![Dmarc check](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-check-4697.jpg) 

Threat actors used ransomware to target Ingram [Micro’s internal systems](https://money.usnews.com/investing/news/articles/2025-07-05/ingram-micro-says-identified-ransomware-on-certain-of-its-internal-systems). As a result, the IT distributor took its systems offline for some time. They took mitigation steps to limit the extent of the ransomware attack. Also, Ingram Micro filed an [8-K form](https://corporatefinanceinstitute.com/resources/accounting/form-8-k/) with the [US Securities and Exchange Commission](https://www.linkedin.com/company/secgov). It has also been working with \*\*third-party forensic experts and [law enforcement agencies](https://www.naplesnews.com/picture-gallery/news/2025/07/14/florida-law-enforcement-agencies-announce-operation-southern-slowdown/85195491007/) to investigate the cyberattack.

So far, there has been no clarity around the **key perpetrator**. However, a report by Bleeping Computer suggests that the SafePay ransomware gang is involved in this cyber mishap. SafePay is believed to have come out of [LockBit](https://www.cryptopolitan.com/lockbit-developer-extradited-united-states/).

Ingram Micro managed to contain the threat attack on Tuesday.

![Dmarc record generator](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-record-generator-6622.jpg) 

## Google Gemini can be exploited to generate malicious email summaries!

Google Gemini comes with a flaw that can help phishing actors generate malicious email summaries. The email summaries may look genuine or legitimate, but they may come with warnings or malicious instructions that can redirect users to [phishing sites](https://usaherald.com/ai-spear-phishing-attacks-surge-hackers-use-generative-ai-to-build-realistic-fake-sites/).

This type of attack uses indirect prompt injections that are hidden in plain sight in the email content . Such prompt attacks have been reported multiple times since 2024\. Despite various safety measures being deployed, threat actors have continued to exploit [Gemini email](https://www.csoonline.com/article/4023032/google-gemini-vulnerability-enables-hidden-phishing-attacks.html) summaries successfully.

![Dmarc analyzer](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-analyzer-5693.jpg) 

\*\*Mozilla’s bug bounty program recently disclosed a prompt injection attack on Gemini. Threat actors use an invisible directive for Gemini to come up with an email. The malicious instructions stay hidden in the text of the email in the form of [HTML](https://www.investopedia.com/terms/h/html.asp) and [CSS commands](https://www.ionos.com/digitalguide/websites/web-design/css-commands/). Since there are no [malicious links](https://hackread.com/discord-malware-attacks-as-50000-malicious-links/) or attachments, these emails easily pass the authentication checks and safely land in the inbox of target users. _When a user opens the email and asks Gemini to create a summary of the email content, Gemini will follow the instruction_.

To safeguard against such [cyber threats](https://www.wired.com/story/trump-administration-deprioritizing-russia-cyber-threat/), organizations must implement [SPF](https://autospf.com/blog/spf-guide-understanding-sender-policy-framework/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [DMARC](https://dmarcreport.com/) protocols to strengthen [email security](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) and \*\*protect users from [phishing and spoofing](https://thehackernews.com/2024/07/proofpoint-email-routing-flaw-exploited.html) attacks.

![Dmarc report](https://media.mailhop.org/dmarcreport/images/2025/07/dmarc-report-4567.jpg) 

Google’s spokesperson has stated that they are implementing the necessary mitigation steps to [prevent prompt injection](https://www.darkreading.com/remote-workforce/google-gemini-ai-bug-invisible-malicious-prompts) attacks in the future. They are also highly confident about their “robust defense” system. Meanwhile, experts advise users to \*\*stay alert and take precautionary measures to avoid such cyber mishaps. They must not trust Gemini summaries blindly. Also, implementing a post-processing filter to scan Gemini output can be quite helpful.

## Sources

- [RFC 7208 - Sender Policy Framework (SPF)](https://datatracker.ietf.org/doc/html/rfc7208)
- [RFC 7489 - Domain-based Message Authentication, Reporting, and Conformance (DMARC)](https://datatracker.ietf.org/doc/html/rfc7489)

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ email security ](/tags/email-security/)[ News ](/tags/news/)[ SPF ](/tags/spf/) 

![Brad Slavin](https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 4m  Akira flaunts victims, Idaho targets orthodontist, AI granny protects  Nov 22, 2024 ](/blog/akira-flaunts-victims-idaho-targets-orthodontist-ai-granny-protects/)[  Foundational 4m  Ambient Light Spying, Cybersecurity Prices Drop, Euro 2024 Threats  Jul 10, 2024 ](/blog/ambient-light-spying-cybersecurity-prices-drop-euro-2024-threats/)[  Foundational 4m  Banks Drop OTPs, Major Cyber Heist, Spying Spouses Arrested  Jul 18, 2024 ](/blog/banks-drop-otps-major-cyber-heist-spying-spouses-arrested/)[  Foundational 4m  Car Cameras Hackable, UK Water Breach, Thailand Frees Captives  Feb 28, 2025 ](/blog/car-cameras-hackable-uk-water-breach-thailand-frees-captives/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit","description":"Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit from DMARC Report explains practical steps for email authentication, domain.","url":"https://dmarcreport.com/blog/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/","datePublished":"2025-07-17T12:00:48.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2025-07-17T12:00:48.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://dmarcreport.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/"},"articleSection":"foundational","keywords":"dkim, DMARC, email security, News, SPF","wordCount":1124,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Mcdonald’s Application Tips, Ingram Micro Recovers,Gemini Email Exploit","item":"https://dmarcreport.com/blog/mcdonalds-application-tips-ingram-micro-recoversgemini-email-exploit/"}]}
```
