Malware terrorizes Linux, Cyberattack disrupts water, Cyber incidents surge
Another week, another dose of cyber news! Hello people! We are back again with our weekly cyber news bulletin. This time, we will discuss a massive malware attack on Linux servers. Also, the disruption of the US water supply because of a cyberattack is a matter of concern. Lastly, our focus will be on the…
How to manually decipher DMARC reports and why is it a difficult thing?
DMARC reports are the backbone of email authentication. Reading these reports helps you understand the situation of outgoing emails and how recipients’ mailboxes handle them. Reading these reports lets you know if an unauthorized, malicious person is sending emails from your domain. However, there is a catch; these DMARC aggregate and forensic reports are in…
Understanding the pct tag (percentage tag) in DMARC
The DMARC record you publish in your domain’s DNS helps the receiving servers know how you want them to handle illegitimate emails sent from your domain. Do you know there exists a way using which you can instruct the receiving server to check a prespecified percentage of emails to see if they are legitimate or…
Manufacturing industries targeted, Senator Victimizes Deepfake ,Kia owners beware
Here comes the new month of October, and threat actors have already started their malicious activities. Week 1 news snippets are all about the latest trends in the world of cyberattacks—be it ransomware attacks, deep fake attacks, or remote hacks. Staying aware of these attacks is the only way to strengthen your cybersecurity mechanism and…
How can MFA and DMARC secure your online presence?
Just when you thought your details were safe online, news breaks out about another grave data breach or phishing attack. You’re not alone in this; it is true that more than one million people join the internet every day! In 2024, so far, the damages caused by cyberattacks have reached 9.5 trillion USD globally. Guess…
Best practices for forwarding emails to Gmail users
When you forward emails from any account to Gmail, the possibility of that email passing through the authentication checks decreases. But here are some recommendations that can help emails forwarded to Gmail pass authentication checks without any trouble. Google encourages setting up SPF, DKIM, and DMARC for authentication. DKIM authentication is even more crucial for…
Kansas Water Cyberattack, Moneygram Halts Operations, Telegram Shares Data
Threat actors and their tactics are getting sophisticated-one attack at a time. In such times, only staying aware of cybercrimes can safeguard your precious data and hard-earned money. This is the 4th edition for the month of September, and we are back with cyber news from around the globe. Keeping yourself updated about the latest…
Using DKIM selectors to enhance control over email authentication
DKIM comes in handy in letting your recipients know if any malicious entity has tampered with the email content in transit. A DKIM selector is part of the whole DKIM process and is especially necessary when publishing multiple DKIM records. When you publish several DKIM records, multiple DKIM keys get involved, which is where the…
