A Roundup of the Top Phishing Attacks in 2024 So Far
Is your mailbox flooded with unsolicited emails? While most of these emails are harmless (like bulk or spam), some of them have the potential to seriously damage your entire ecosystem. Year after year, these emails are getting more frequent and formidable. In fact, we are only halfway into 2024, and the number of fraudulent emails…
What is the Role and Relevance of PTR DNS Resource Records?
You might be familiar with DNS records that map domain names to IP addresses. But have you ever come across the term “PTR (Pointer) records” or perhaps “reverse DNS records?” PTR records, or reverse records, as the name suggests, are the exact opposite of “a” DNS records. So, instead of translating domain names to IP…
Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies
News Flash: The infamous North Korean group of hackers — Kimsuky strikes back! Kimsuky is not a new name in the cybersecurity circle, as it is well known for pulling off sophisticated email-based attacks and leveraging social engineering tactics. But this time, they have changed their approach and shifted their focus towards organizations that have DMARC…
Decoding PCI DSS v4.0 and Enhancing Security with DMARC: A Guide
Does your business involve your customers making card payments? If yes, this one is for you! Now that digital payments have become the backbone of most businesses, you cannot afford to let any unauthorized entity snoop in on your transactions or your customers’ card details. They could use this information to unleash havoc on your…
DMARC Setup Stage 1- Preparation
The process of deploying DMARC is crucial but complicated. To avoid problems related to maintenance, modifications, reporting, and troubleshooting, it’s vital that you plan and record everything. We suggest that before you start creating or modifying DNS records to analyze DMARC data, you take care of two things for a smooth deployment: Why Should You…
Fixing Google Calendar Invites That Fail DMARC Checks
Google Calendar invites fail DMARC checks when the recipient replies to them, and the response goes back to Google’s servers instead of the sender’s domain. This happens because the ‘From’ address and the originating server don’t match. This failure also occurs due to the fact that Google uses shared IP addresses to send Google Calendar…
Is Your Google Workspace DKIM Setup Broken?
Deploying and configuring DKIM on Google Workspace is a two-step process, and administrators often skip the second step. In such cases, DKIM and DMARC function properly, and email delivery is not impacted either. However, DKIM doesn’t authenticate emails using your custom domain. Let’s see what these two steps are and how you can avoid breaking…
Microsoft Plans to Impose a Per Day Limit on Exchange Online Bulk Emails to Reduce Spam
Starting January 1, 2025, Microsoft Exchange Online users will have to change their plans as a limit of 2,000 external recipients per 24 hours will be implemented. This is because the platform was never designed for high-volume transactional emails. So, this decision has been taken with respect to that and not to overburden the resources….
