Cybersecurity threatens water, Android users warned, Mexico faces cyberattacks

It’s already week four of November, and the holidays are just around the corner. Leniency at workplaces is already resulting in increased cases of cyberattacks. Before you get too busy with vacation plans and late-night parties with your loved ones, here’s a gentle reminder from our side that your data needs protection and deserves your…

Understanding the gaps in the global cybersecurity landscape in 2024

Cybersecurity is more than a buzzword today. It is more of a necessity for every organization, whether big or small. We say this because all of them are connected to the internet in some way or another, which means that they are also exposed to the risks. Moreover, hackers, cybercriminals, and state-sponsored attackers are continuously…

Why is it optional to receive DMARC aggregate and forensic reports?

Why is it optional to receive DMARC aggregate and forensic reports?

DMARC reports let you know two important things: whether legitimate emails sent from your domain are failing DMARC checks and whether someone is trying to send phishing emails using your domain. Such information is critical for the effectiveness of the deployed email authentication protocols; you get to know if your SPF, DKIM, and DMARC configurations…

Akira flaunts victims, Idaho targets orthodontist, AI granny protects

Akira flaunts victims, Idaho targets orthodontist, AI granny protects

Whether you are serious about your life or not, threat actors are taking their attacking skills quite seriously. Every day, we hear unfortunate news of cyber scams left, right, and center. Digitization seems to be both a blessing and a curse. Such attacks leave us overwhelmed, and it seems that there is no way out. …

What is typosquatting, and how is it used for phishing and impersonation attacks?

The human tendency to skimp through or glance over things that look familiar is not much of a big deal until it is misused by the bad guys. This applies even in the context of cybersecurity, wherein cybercriminals try to dupe you by exploiting small mistakes or oversights—like a typo in a web address. They…

Vendor Causes Breach, Texas Supplier Hacked, Nokia Investigates Breach

Hey people! It’s a new week, and we are back with a fresh dose of cybersecurity news once again. This week, it’s all about big companies being attacked by threat actors. Now you know that no one is completely safe from cyberattacks, not even big industry names.  The sensitive data of Amazon employees was breached…

4 situations in which you should use the DMARC’s p=none policy

DMARC has three policies— none, quarantine, and reject. The ‘quarantine’ and ‘reject’ policies are strict and are used the most. However, there are cases where the ‘none’ policy is ideal. The ‘none’ policy is enforced using the p=none tag in a DMARC record. It instructs the receiving servers to take no action against unauthorized emails…

External DNS records required for SPF in Microsoft 365

SPF records are TXT records that prevent unauthorized emails sent from your domain from landing in the recipients’ inboxes. This minimizes the chances of someone getting duped under the impression that an official representative from your company is communicating with them, asking for sensitive details or transferring money.  Domain owners are allowed to have only…