This week’s latest scoop in cybersecurity will take you to the TryCloudflare exploitation for deploying RATs, the new FBI warning about scammers impersonating crypto exchanges, the MS Azure outage details, new features on Google Chrome against infostealers, and the security gap in Whatsapp for Windows that allows threat actors to run malicious scripts without alerts. Stay tuned to learn more about these and how to stay safe!
North Korea-backed cyber group prying into critical US infrastructure!
by Duocircle
A cyber-espionage group backed by North Korea has been sneaking into the vital intellectual property and technical information of the US. The group is a part of North Korea’s foreign intelligence service. From aerospace to defense, engineering companies to nuclear science, the group has been prying into critical infrastructures.(more…)
Why are sources an important aspect of ensuring email security with DMARC?
by DuoCircle
By now, you might have heard a lot about how DMARC reports are crucial for your organization to gain insights into your email traffic and learn how your authentication protocols are waging against phishing and spoofing attempts. They reveal the harsh truth, that is, not all emails claiming to be from your domain are legitimate. While you’re decoding DMARC reports, have you ever looked into the sources of these emails?
Email authentication isn’t simply about verifying senders; it’s about protecting your organization from phishing, spoofing, and other email-based attacks and, most importantly, ensuring that your email campaigns reach their intended recipients. An email authentication protocol that ticks all of these boxes is DMARC, or Domain-based Message Authentication, Reporting, and Conformance.
This week’s cybersecurity updates include the latest Google Chrome malicious file alerts, the story of KnowBe4 hiring a North Korean Hacker, the 400 cyberattacks on the Greece Land Registry, US Sanctions on Russian Hackers targeting critical infrastructure, and threat actors taking advantage of fake CrowdStrike updates. Stay tuned!
Learning to perform SPF delegation for enhanced email delivery
by DuoCircle
The SPF delegation method is for domain owners who authorize an external email server to send emails on their behalf without having them fail the email authentication checks. This requires you to make some alterations to the existing SPF record.
The risk of cybercriminals intercepting your emails and tampering with them is perpetual. But there’s a way to mitigate this risk and make sure that your emails are delivered unaltered without any malicious interference. Implementing DKIM or DomainKeys Identified Mail is your masterstroke against email tampering and spoofing. It relies on cryptographic techniques to sign your emails, allowing recipients to verify that they truly originate from your domain and have not been messed with.
Here’s an inside look at the latest cybersecurity news covering the 15 million emails stolen from Trello, Kaspersky’s exit from the U.S., what Revolver Rabbit is doing with 500,000 domains, the AT&T Data Breach, and info-stealer malware being distributed via Facebook ad campaigns. Let’s take a look!
Threat actors bypass DKIM authentication checks with the DKIM replay attack technique. This allows them to attain a copy of a valid email and replay it with additional or replaced From, To, or Subject headers. As the original DKIM signature is valid, the replayed version also passes the DKIM authentication checks. This way, even phishing and spoofing emails land in the recipients’ inboxes instead of spam folders.
Email authentication has become a non-negotiable standard for companies and governments, as it prevents phishing, spoofing, ransomware, and other email-based cyberattacks. Email authentication protocols also raise alerts for modified email contents as these changes indicate tampering done by threat actors.
Chinese Hackers Hijack Routers, US Stops Botfarm, Google Adds Passkeys – Cybersecurity News [July 08, 2024]
by DuoCircle
Here we are back again with cybersecurity’s latest covering the news that shook the world this week. We’ll take a look at Chinese hackers taking over SOHO routers for attacks, how the US DoJ shut down Russian bot accounts on X, the new passkeys for Google account protection, the Fujitsu data breach, and the compromise of personal and healthcare information of the City of Philadelphia. Stay tuned!
Google has always prioritized user safety and has designed the Google Critical Security Alert to warn users whenever a threat actor or unauthorized person tries to access your Google account. This security feature also alerts you if there is a login to your account from a new or unrecognized device, allowing you to deny access if you don’t recognize the device. You receive a notification on your primary device (in which the particular Google account is logged in), where you have to click on either of the options – ‘Yes, it’s me’ or ‘No, secure account.’ You may also receive this notification via email.
How does ARC subside the shortcomings of SPF, DKIM, and DMARC?
by DuoCircle
Email authentication protocols like the Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) are considered to be robust mechanisms to protect against cybersecurity threats such as spoofing and phishing. This is when you are sending emails from your domain, but when it comes to forwarding emails, these protocols fall short.
Why an email sent by a third-party vendor passed SPF/DKIM checks but failed the DMARC check?
by DuoCircle
DMARC helps prevent spoofed emails from bypassing spam filtering, but it’s just one part of a broader anti-spam strategy. Not all DMARC reports are equal; some show detailed recipient responses, while others only indicate success or failure. Understanding why a message failed is as important as knowing if it did.
Welcome back to our weekly bulletin, where we bring you the latest cybersecurity information so you can stay safe against the latest attacks and malicious campaigns. We’ll share details about the new Brain Cipher ransomware, how info stealers could track users linked to child abuse sites, the corporate attack on Team Viewer, the story of a scorned employee stealing patient healthcare data, and the latest crypto drainer phishing attack on Ethereum. Stay tuned!
A guide to DKIM syntax– create your DKIM record for free
by DuoCircle
A DKIM record is a DNS record in the TXT format that includes a public key that is used by recipients’ mail servers to verify the legitimacy of emails they receive from your domain. A standard DKIM record has a name, version, key type, and public key. Some domain owners think that creating a DKIM record requires hardcore technical expertise, but that’s not true, especially when it comes to generating a basic DKIM record. You just need to be an average tech user, and you will be able to create a DKIM record on your own.
Have you ever wondered how much more effective your marketing could be if you had the right email addresses? In 2023, email marketing delivered a return on investment (ROI) of $42 for every $1 spent, making it one of the most cost-effective marketing strategies available. Yet, sourcing accurate email addresses can feel like finding a needle in a haystack. Fear not! This guide will help you discover practical methods to build your email list with precision and efficiency.
Know these Gmail SMTP error codes to fix email delivery issues for your company’s domain
by DuoCircle
Not all your emails pass authentication checks and other filters, thus returning with error codes. These codes help diagnose and understand issues that occurred during email transmission, letting you fix them and resend the message. For instance, it could indicate if the problem is due to incorrect credentials, a blocked email, or a temporary server issue. Some error codes indicate security-related issues, such as failed authentication attempts or detection of spam or phishing attempts.