Decoding the Subtle Art of Deception: Homoglyphing and Its Role in Phishing Attacks

Decoding the Subtle Art of Deception: Homoglyphing and Its Role in Phishing Attacks

Have you ever confused “0” (the digit) for “O” (uppercase alphabet) while entering a password? Or have you stared at your screen trying to differentiate “1” from “l” (lowercase L)? If so, you are not alone! Truth be told, these mix-ups are fairly common and might seem harmless, but that is only until they are…

Beware of Phishing Attempts- Apple Users’ Version!

Beware of Phishing Attempts- Apple Users’ Version!

Lately, Apple users across 92 countries have received the biggest shock of their lives in their email and iPhone inboxes! Apple contacted them regarding a “mercenary spyware attack.”  To make it more ominous, the users would get to see a “Threat notification” if they logged into their Apple ID.  The message emphasized the gravity of…

Microsoft Plans to Impose a Per Day Limit on Exchange Online Bulk Emails to Reduce Spam

Microsoft Plans to Impose a Per Day Limit on Exchange Online Bulk Emails to Reduce Spam

Starting January 1, 2025, Microsoft Exchange Online users will have to change their plans as a limit of 2,000 external recipients per 24 hours will be implemented. This is because the platform was never designed for high-volume transactional emails. So, this decision has been taken with respect to that and not to overburden the resources….

DomainKeys and DKIM Are Slightly Different

DomainKeys and DKIM Are Slightly Different

DomainKeys is an older technology that was combined with Cisco’s Identified Internet Mail (IIM) to develop DKIM—an email authentication protocol that prevents phishing emails sent from your domain from reaching recipients’ primary inboxes. Moreover, DKIM also ensures that nobody tampers with the message in transit.  People often use these terms interchangeably, but let’s figure out…

What is a DKIM Replay Attack and How to Prevent it?

What is a DKIM Replay Attack and How to Prevent it?

In 2023, as many as 45.6% of total emails were identified as spam. While CISOs and technology enthusiasts are trying their best to ward off these attacks, cybercriminals are not behind in exercising their brain muscles to come up with newer ways of exploitation.  One such relatively recent technique is a DKIM replay attack, where…