Akira flaunts victims, Idaho targets orthodontist, AI granny protects

Akira flaunts victims, Idaho targets orthodontist, AI granny protects

Whether you are serious about your life or not, threat actors are taking their attacking skills quite seriously. Every day, we hear unfortunate news of cyber scams left, right, and center. Digitization seems to be both a blessing and a curse. Such attacks leave us overwhelmed, and it seems that there is no way out. …

What is typosquatting, and how is it used for phishing and impersonation attacks?

What is typosquatting, and how is it used for phishing and impersonation attacks?

The human tendency to skimp through or glance over things that look familiar is not much of a big deal until it is misused by the bad guys. This applies even in the context of cybersecurity, wherein cybercriminals try to dupe you by exploiting small mistakes or oversights—like a typo in a web address. They…

Vendor Causes Breach, Texas Supplier Hacked, Nokia Investigates Breach

Vendor Causes Breach, Texas Supplier Hacked, Nokia Investigates Breach

Hey people! It’s a new week, and we are back with a fresh dose of cybersecurity news once again. This week, it’s all about big companies being attacked by threat actors. Now you know that no one is completely safe from cyberattacks, not even big industry names.  The sensitive data of Amazon employees was breached…

4 situations in which you should use the DMARC’s p=none policy

4 situations in which you should use the DMARC’s p=none policy

DMARC has three policies— none, quarantine, and reject. The ‘quarantine’ and ‘reject’ policies are strict and are used the most. However, there are cases where the ‘none’ policy is ideal. The ‘none’ policy is enforced using the p=none tag in a DMARC record. It instructs the receiving servers to take no action against unauthorized emails…

External DNS records required for SPF in Microsoft 365

External DNS records required for SPF in Microsoft 365

SPF records are TXT records that prevent unauthorized emails sent from your domain from landing in the recipients’ inboxes. This minimizes the chances of someone getting duped under the impression that an official representative from your company is communicating with them, asking for sensitive details or transferring money.  Domain owners are allowed to have only…

Snowflake Attacker Arrested, Hellcat Targets Schneider, Whistleblower Granted Relief

Snowflake Attacker Arrested, Hellcat Targets Schneider, Whistleblower Granted Relief

Hello everyone! It’s November, and everyone is gradually getting into that holiday mood. But this festive season, do not let your carelessness wipe away your bank account. Don’t forget to double-check your cybersecurity setups before you get busy with the celebrations. Also, keeping yourself well-versed with the latest cyber events is a must so that…

Email authentication: Why it matters and how SPF, DKIM, and DMARC ensure security

Email authentication: Why it matters and how SPF, DKIM, and DMARC ensure security

The emails you send out to your clients are not just about informing them about your business but creating a relationship with them. Imagine what would happen if the emails that go from your end rarely reach them? Or even worse, what if a hacker dupes your customers by sending them emails on your behalf?…

Insufficient Cybersecurity Training, FakeCall Malware Threat, Women Duped Airport

Insufficient Cybersecurity Training, FakeCall Malware Threat, Women Duped Airport

Once again, we are here with our weekly dose of cyber news that helps you stay well-informed and ahead of the threat actors. This week, we will shed light on the significance of cybersecurity training in organizations, learn in detail about FakeCall Android malware, and learn about the nightmarish experience of an Indian woman in…

What is the right way to split DKIM keys?

What is the right way to split DKIM keys?

DNS limitations sometimes require splitting DKIM keys. Splitting keys helps ensure compatibility with DNS limitations, especially when dealing with long keys that offer stronger security. Usually, DKIM keys are split at the time of initial configuration if they exceed the DNS length limits. Most DNS providers impose a limit of 255 characters per line, so…

This is the season of scams: 2024 holiday guide to spotting phishing attacks

This is the season of scams: 2024 holiday guide to spotting phishing attacks

The holiday season is right around the corner, which means it’s the time for lots of online shopping, hotels, and flight bookings, not to mention a sudden surge in cyberattacks. You might think that the holiday season is supposed to be exciting and fun, but the truth is that it can become a prime opportunity…

Senate Campaigns Unprotected, Enterprise SaaS Risks, US launches encryption

Senate Campaigns Unprotected, Enterprise SaaS Risks, US launches encryption

Cyber awareness is no longer a luxury in today’s time. It does not help you stand out in the crowd but, in fact, enables you to safeguard your brand, employees, and personal data from threat actors. It is an ultimate necessity to familiarize yourself with the cybersecurity landscape if you wish to stay at par…

What is DMARC’s Subdomain Policy (sp) tag and how does it work?

What is DMARC’s Subdomain Policy (sp) tag and how does it work?

If you thought that your subdomains deserved any less attention than your primary (parent) domain, you’re mistaken! The truth is that the subdomains do not receive as much importance as your primary domain, and even the cyberattackers recognize this. This is why subdomains become prime targets for phishing and spoofing attacks. Since these subdomains aren’t…

Troubleshooting DKIM issues for Google Workspace

Troubleshooting DKIM issues for Google Workspace

If your legitimate emails are failing DKIM authentication, being rejected, or being marked as spam, there might be a misconfiguration in your email authentication records. To know the problem, you need to check your SPF, DKIM, and DMARC records. This guide is here to help you with checking misconfigurations in DKIM.  1. Verify if emails…

Things Financial Institutions Need to Know About Spoofing

The global banking sector has been experiencing a severe surge in cyberattacks, and the US Banking industry is no different. Renowned financial institutions like SunTrust, JP Morgan Chase, and Bank of America have faced the brunt of cybercriminal activities such as spoofing and phishing multiple times. Large or small, no banking institution is safe now…