Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

by DuoCircle

 

This week, in our ongoing coverage of cybersecurity news, we take a closer look at recent cybersecurity news, threats, and innovative solutions impacting the virtual landscape. We tried covering everything ranging from coordinated cyberattacks on municipalities and banks to growing national security fears as we examined the vulnerabilities that threaten critical sectors. We’ll also cover why ransomware is such a growing threat to critical infrastructure and how co-opetition is becoming a major theme in cybersecurity. We will conclude with a highlight of the strategic alliance between Cognizant and CrowdStrike that enhances enterprise defense against emerging cyber threats.

(more…)

VeriSend SaaS

VeriSend SaaS

Building Brand equity over time is very expensive and valuable. Bad actors spoof these well-known brands to attempt to steal from unsuspecting people who believe the email is coming from a known Brand.

 

VeriSend is a software-as-a-service designed to be an independent third-party verification system that allows email providers the ability to add Brand logos to email messages.

We maintain a service that allows mail providers to display valid Brand logos when legitimate mail is received.

VeriSend protects the brand by displaying the Brand’s logo for Valid EMail.

Mail recipients know to “look for the logo”. If they see the Brand logo, they can trust the message is from their favorite brand.

Conversely, it they do not see the Brand logo, it is a fake message, 100% of the time!

Look for the Logo

Look for the Logo

Verisend Verification

Each Verified Email will have common elements to help the recipient know that the message is legitimate.

The first element is the Brand logo of the sender. In this example, GoDaddy is the legitimate sender.

The second element is the name of the Brand Sender, Go Daddy

The third brand element is an active link to the website of the Brand Sender. This link is curated and always safe to click.


Verified Brand Email

The Verified Sender logo is our seal and proof to the recipient that this message is legitimately from the Brand sender.

VeriSend SaaS

Restoring Confidence to Email with Verifiable Sender Identities

Email is a wonderful way to communicate and a fantastic business tool that allows nearly instantaneous delivery at near zero cost.

Unfortunately, anonymity and forgery have restricted the full potential of email to be a trusted method deliver a wide variety of information.

I have been working for 3 years to use verifiable message metadata cross referenced against a Library of Known Good Senders assists in 100% sure identification of Good Senders and of individual messages.

Read my whitepaper here:

Verisend: Restoring Confidence to Email with Verifiable Sender Identities

Understanding the concept of fallback mechanisms in Sender Policy Framework

Understanding the concept of fallback mechanisms in Sender Policy Framework

Understanding the concept of fallback mechanisms in Sender Policy Framework

by DuoCircle

 

Sometimes, when an email doesn’t pass the SPF authentication checks, the receiving server or policies offer better ways to handle or mitigate the failure. This is done using fallback mechanisms— a way to secure email communication without hampering the flow and productivity (more…)

Yahoo Japan has mandated DMARC and domain authentication

Yahoo Japan has mandated DMARC and domain authentication

 

In November 2023, Yahoo announced that by February 1st, 2024, any company that sends more than 5,000 emails per day has to deploy DMARC to minimize the risk of email-based spoofing, phishing, and ransomware. After this announcement, the rate of DMARC adoption surged, and now Yahoo Japan has also made DMARC and domain authentication mandatory for users as of December 2024. Experts see this as a great opportunity to improve companies’ email security posture. (more…)

Is your DMARC enforcement strict enough?

Is your DMARC enforcement strict enough?

 

Back in 2024, email service providers such as Google and Yahoo rolled out new email-sending policies. One would have thought that organizations would begin to take email security more seriously, but so far, that hasn’t been the case. In fact, cybersecurity experts have found that phishing attacks have shot up, with the number of phishing messages increasing by 202% in the second half of 2024.

(more…)

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

by DuoCircle

 

Cybercriminals are enhancing their capabilities, as evidenced by the latest PhishPWP phishing threat. Similarly, this week’s cybersecurity bulletin highlights the latest ransomware attack on AWS servers, making recovery impossible without the attacker’s key. We also look at how cybercriminals use popular social media channels like Telegram. Zero-day attacks are the most dangerous of all, as they emerge from practically nowhere. This week’s news highlights one such attack on Fortinet FortiGate firewall users. Finally, we round off a reputed university shutting off classes, fearing a cyber-attack on its network.    

(more…)

Implementing DKIM the right way: A guide for ESPs

Implementing DKIM the right way: A guide for ESPs

 

You might have heard that email authentication protocols are only for businesses, but that’s not entirely true! 

Don’t you think email security is crucial for everyone, including businesses that send email campaigns and email service providers (ESPs) that facilitate them? If so, you can agree with us when we say that email authentication is a must for every entity in the email ecosystem, including the ESPs. 

(more…)

Enforcement rules for DMARC for optimum protection against phishing and spoofing

Enforcement rules for DMARC for optimum protection against phishing and spoofing

Enforcement rules for DMARC for optimum protection against phishing and spoofing

by DuoCircle

 

Just like SPF offers domain owners the choice between Softfail and Hardfail, DMARC has three enforcement rules: none, quarantine, and reject. Each has its own significance and relevance in the DMARC compliance journey. 

(more…)

Microsoft Alerts Millions, War Expands Globally, Salt Typhoon Surge – Cybersecurity News [January 06, 2025]

Microsoft Alerts Millions, War Expands Globally, Salt Typhoon Surge – Cybersecurity News [January 06, 2025]

Microsoft Alerts Millions, War Expands Globally, Salt Typhoon Surge – Cybersecurity News [January 06, 2025]

by DuoCircle

 

Ensuring proper cybersecurity is at the top of every organization’s agenda this year. That explains why Microsoft cautions its Windows 10 users and asks them to upgrade their PC’s OS before the 14 October 2025 deadline. However, even the most robust cybersecurity strategies might seem inadequate, especially as three more telecoms become victims of the Salt Typhoon.

(more…)

Understanding everything about DMARC records and tags

Understanding everything about DMARC records and tags

 

Email security is a growing concern for businesses and individuals alike. Increased email spoofing and phishing attempts have made it crucial to implement security measures to safeguard communication channels. One such powerful tool to protect email communications is DMARC or Domain-based Message Authentication Reporting and Conformance. Its job is to authenticate email messages and take suitable action against unauthorized emails. The DMARC policy works in coordination with SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail)  protocols.

(more…)

What is Apple Business Mail and how can you set it up using Apple Business Connect

What is Apple Business Mail and how can you set it up using Apple Business Connect

What is Apple Business Mail and how can you set it up using Apple Business Connect

by DuoCircle

Apple Mail is not very prominently used in business emails because, unlike Gmail, Yahoo, and other mailboxes, it doesn’t support BIMI. However, Apple has taken the initiative to resolve this issue. With the latest iOS 18.2 update, Apple is now letting its users send branded emails that carry their unique identity. In simple words, you can send emails that show your brand logo and name, just like BIMI. This is done to build trust among companies regarding email authentication

 

Apple Mail is not very prominently used in business emails because, unlike Gmail, Yahoo, and other mailboxes, it doesn’t support BIMI. However, Apple has taken the initiative to resolve this issue. With the latest iOS 18.2 update, Apple is now letting its users send branded emails that carry their unique identity. In simple words, you can send emails that show your brand logo and name, just like BIMI. This move enhances email security and builds trust among companies regarding email authentication.

(more…)

Best practices to make Privileged Account and Session Management a breeze

Best practices to make Privileged Account and Session Management a breeze

Best practices to make Privileged Account and Session Management a breeze

by DuoCircle

 

Let’s ask you a pertinent question about your organization’s security.

Do you think that the accounts that manage your organization’s most critical systems and sensitive data are well protected? 

If you have to think twice before answering this question, chances are that these might not be as secure as they should be. 

(more…)

Essential Check Secures, Prevention Beats Recovery, Treasury Cyber Breach- Cybersecurity News [December 30, 2024]

Essential Check Secures, Prevention Beats Recovery, Treasury Cyber Breach- Cybersecurity News [December 30, 2024]

Essential Check Secures, Prevention Beats Recovery, Treasury Cyber Breach- Cybersecurity News [December 30, 2024]

by DuoCircle

 

The New Year is the time for resolutions. Individuals and organizations must focus on cybersecurity and resolve to take proactive steps to prevent cybercrime. Data breaches have become increasingly frequent. With people increasingly using smartphones to access the internet, securing these instruments should be paramount. In the face of rising cyber threats, ensuring robust email security on your devices, such as conducting security checks on Android and iPhones, is a vital step to safeguarding your personal and organizational data from breaches and attacks. 

(more…)

The ultimate DMARC monitoring guide you need to keep your domain safe

The ultimate DMARC monitoring guide you need to keep your domain safe

The ultimate DMARC monitoring guide you need to keep your domain safe

by DuoCircle

 

The emails you send out to your clients have the potential to transform your business. Although you might already know this, what you might not be aware of is that not all your emails reach your recipients’ inboxes. Instead of landing in the inbox where the recipient can read and engage with the email, some emails might get flagged as spam or, worse, fail to deliver altogether. There are many reasons this could happen, but the most common reasons that Email Service Providers (ESPs)  flag your emails are improper authentication, suspicious activities, or malicious actors attempting to spoof your domain. These are some of the last things you would want for your emails. 

(more…)

Microsoft Cybersecurity Transparency, Chrome Update Required, Google Calendar Phishing – Cybersecurity News [December 23, 2024]

Microsoft Cybersecurity Transparency, Chrome Update Required, Google Calendar Phishing – Cybersecurity News [December 23, 2024]

Microsoft Cybersecurity Transparency, Chrome Update Required, Google Calendar Phishing – Cybersecurity News [December 23, 2024]

by DuoCircle

 

The year 2024 is ending, but unfortunately, cybercrime never ends. Criminals are always on the look out for innovative ways to scam user accounts and steal data. So, service providers have their tasks cut out and keep users in the loop about the various security measures they initiate. Microsoft has taken the lead in adopting greater transparency in cybersecurity matters. This week, we shall also discuss the various Google Support Services criminals use to launch cyberattacks. Finally, we round off 2024 and welcome the new year 2025 by listing cybersecurity trends users must watch out for to secure their credentials and prevent them from being compromised.

(more…)

Microsoft Update Dilemma, Cyberattack Disrupts LKQ, Krispy Kreme Breach – Cybersecurity News [December 16, 2024]

Microsoft Update Dilemma, Cyberattack Disrupts LKQ, Krispy Kreme Breach – Cybersecurity News [December 16, 2024]

Microsoft Update Dilemma, Cyberattack Disrupts LKQ, Krispy Kreme Breach – Cybersecurity News [December 16, 2024]

by DuoCircle

 

Cybercriminals are intelligent and innovative, proactively searching for notorious ideas to launch their cyberattacks. This week’s news article discusses two innovative methods that threat actors consider, the crypto-romance scammers and the digital arrest scam. Nowadays cyber attackers are willing to target almost anything, we will learn about the two attacks that targeted on an online doughnut chain and an auto parts company. Hence, efforts are being made on grounds of user awareness and system updates that should help prevent such attacks. But downloading and installing updates can also be confusing so we have also discussed whether to download the latest Microsoft system update or not. Read on to learn more.  

(more…)

Pin It on Pinterest