DMARC is now mandatory in New Zealand: Here’s what the NZ government expects
by DuoCircle
Most countries have already made DMARC enforcement mandatory, especially for government agencies (after all, that’s where the real threats lie). But New Zealand wasn’t on this list until now!
This week’s cybersecurity round-up brings you stories you need to know, from fake crypto wallets lurking in Firefox to major breaches hitting airlines, global courts, and healthcare groups. We’ll see how threat actors are shifting from traditional tactics and which new threats are on the radar.
Stay digitally safe and well-informed about your personal information security!
As we move further into the digital age, there is a growing appetite for brands to build a relationship with their audience by reaching them with personalized communication. Email marketing is a powerful weapon, but most people have never been able to figure out how to conduct email campaigns manually or with high-end tools. Once organizations understand why email marketing software works better than manual efforts, they can redirect their efforts into more effective ways.
When it comes to B2B and B2C business communications, email plays a crucial role as a core communication channel. From running marketing campaigns to offering customer support, from notifying customers with transactional details to engaging them one-on-one with newsletters and emails, they do it all for your business.
But what if these emails do not reach your audience at all? Poor email deliverability can not only affect your day-to-day business operations but also tarnish your brand reputation. This is exactly why you need DMARC to enhance your email deliverability.
Let’s find out how your email deliverability is dependent on DMARC.
SonicWall Malware Warning, Crypto Phishing Scheme, Medical Data Exposed – Cybersecurity News [June 23, 2025]
by DuoCircle
If you’re online, you’re a target, and this week proves it once again. Attackers have cloned a popular VPN app, used crypto support tools for phishing, and exposed data from hospitals, city councils, and even an international sports event. Here’s a deeper look into cybersecurity’s latest threats and how to stay protected!
3 emerging AI-powered cyber threats and how to stay protected from them in 2025
by DuoCircle
AI has penetrated deep into our lives, both maliciously and benevolently. The situation has worsened to a point where now one in 10 adults worldwide has fallen victim to an AI-voice cloning scam, and 77% of them have lost money.
Cold emailing is a strategic and effective way for businesses and service providers to reach potential clients, pitch their best offers, and generate high-quality leads. However, with so much noise surrounding AI chatbots, funnel automation, and generative AI, cold emailing no longer works the way it did five years ago. Two major factors that determine the fate of your cold emails are trust and deliverability. Without these two, cold emailing in 2025 may feel like a lost cause.
Avoiding common BIMI pitfalls: What goes wrong and how to fix it
by DuoCircle
BIMI (Brand Indicators for Message Identification) does one simple task— showing your brand logo next to your emails in the recipients’ inboxes. But getting there? Not so much.
You might think it’s easy to get your logo to be displayed next to your emails, but unfortunately, it’s nothing like setting a profile picture. (more…)
Cyberattacks and data breaches continue to hit hard this week! A scam targeting U.S. residents through fake DMV messages is harvesting sensitive data. At the same time, separate breaches have exposed insurance documents at Scania, journalist accounts at The Washington Post, and over a million records from Cock.li’s email service is included. WestJet Airlines is also facing internal disruptions due to a cyberattack. Here’s a quick breakdown of the most important incidents and how to stay safe.
The common ‘DMARC policy not enabled’ error pops up during a reverse DNS lookup, indicating that no valid policy is defined in your domain’s DMARC record. Without a DMARC policy, a DMARC record is of no use— it provides no protection from phishing and spoofing emails sent from your domain.
Crafting a follow-up email that gets results is an art form.
It’s about striking the right balance between being helpful and direct. You want to remind your recipient of your value without being too pushy and encourage them to act. Let’s take a look at some key details you should include in your email follow-ups.
Tackling common SPF errors: A cheatsheet for safer email authentication
by DuoCircle
SPF, or Sender Policy Framework, is the foundational authentication protocol that tells receiving servers which sources are allowed to send emails on behalf of your domain. Now, if something goes wrong with your SPF setup, it may not only have a direct impact on your email deliverability and security, but also have a ripple effect across other authentication checks, such as DKIM and DMARC. Emails may land in spam, get rejected outright, or leave your domain vulnerable to spoofing attacks—all because of a misconfigured SPF protocol.
This week’s cybersecurity round-up covers serious threats hitting various sectors, including transportation, healthcare, and retail. Key cybersecurity incidents include a massive data breach in a governmental department, a ransomware attack crippling life-threatening healthcare operations, and a sneaky job scam targeting recruiters. Major giants from the business world have also confirmed cyberattacks that impacted employees and disrupted critical business workloads. Read on for full details, known risks, and what’s being done in response, strengthening the defence mechanisms.
Affiliate email marketing is one of the most stable income channels for affiliates – open rates reach 50% and even more in some industries – but there are still quite a few obstacles to overcome, from spam filters to phishing attacks to fake sign-ups. As an advertiser, you’d like to nullify or at least mitigate all those risks, so you can get purchase-prone leads that match your demographics.
How SPF, DKIM, and DMARC quietly protect every email you send?
by DuoCircle
Every email sent from your domain needs to be from a clean, legitimate sender. Even a single communication attempt by a threat actor impersonating your brand can lead to phishing, spoofing, business email compromise (BEC), and ransomware attacks. This is exactly where SPF, DKIM, and DMARC step in every time an email is sent from your domain.
You might be under the impression that the three major email authentication protocols are mutually exclusive. Well, this might be the most common misunderstanding and is particularly true for SPF (Sender Policy Framework).
We are discontinuing Mail Hosting Services and ContinuityEmail effective September 30, 2025. After nearly 20 years of providing email hosting, we’re ending these services to focus on areas where we can better serve modern business needs: email authentication, DMARC implementation, and deliverability solutions. Customers have four months to transition to providers like Google Workspace, Microsoft 365, or other platforms that offer the integrated business tools today’s companies require.
When Mail Hosting Services was launched in June 2005, the digital landscape looked vastly different. Social media was in its infancy, smartphones were still called “PDAs,” and email was the undisputed king of digital communication. Twenty years later, as we announce the end-of-life for our email hosting services, we can’t help but reflect on the incredible journey email has taken—and the rumors of its demise that never quite materialized.
As a business owner, you probably send emails almost every day, whether they are marketing emails, order confirmations, important instructions, or even internal updates. These emails are essentially an extension of your brand’s identity, and we’re sure that the last thing you want is to taint it or for someone to mess with it.
WebRTC powers your everyday video calls, chats, and real-time data sharing. By eliminating the need for central servers, it reduces response times for communication. However, these direct connections can expose your actual IP address, even if you use a VPN or proxy. WebRTC leaks can reveal your identity and location, undermining your privacy and security online.
From hidden backdoors on GitHub to fake Fastlane plugins hijacking social media bots, this week’s cyber updates spotlight how trust in familiar tools is being silently exploited. Major brands like The North Face and Cartier are also dealing with breaches, and U.S. agencies face urgent patch deadlines due to active vulnerabilities. Let’s take a closer look!