How do you receive DMARC reports on external email addresses?

How do you receive DMARC reports on external email addresses?

 

While most domain owners prefer receiving DMARC aggregate and forensic reports on internal email addresses, some want to have them in external inboxes. Internal email addresses refer to those belonging to the same domain for which the DMARC record is created. For example, if your organization’s domain is example.com, then an internal domain email address would be something like employee@example.com. On the other hand, external email addresses are the ones not belonging to that domain. For example, department@otherdomain.com.

(more…)

What are the different phases of DMARC deployment?

What are the different phases of DMARC deployment?

 

With sophisticated cyberattacks looming over your email landscape, you need to employ the latest techniques that not only protect your communications but also enhance the security posture, and DMARC fits the bill! Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps you do just that! It protects your domains against spoofing, phishing, and other email-based frauds. 

(more…)

WPS Office Exploit, Notion Exits Russia, Uber’s $325M Fine – Cybersecurity News [August 26, 2024]

WPS Office Exploit, Notion Exits Russia, Uber’s $325M Fine – Cybersecurity News [August 26, 2024]

WPS Office Exploit, Notion Exits Russia, Uber’s $325M Fine – Cybersecurity News [August 26, 2024]

by Duocircle

 

We’re back with the latest cybersecurity scoop of the week that will keep you privy to the latest attacks and help you stay safe. This week, we’ll take a look at how hackers are leveraging the WPS office to spread malware, the withdrawal of Notion from Russia, how Uber was fined $325 million for illegal data transfers, the Tickler malware attacking US government systems, and the FBI’s report on RansomHub ransomware’s 210 victims and the tactics used. Let’s take a look!

(more…)

VM-expert landed up in jail for planning cyber extortion in New Jersey!

VM-expert landed up in jail for planning cyber extortion in New Jersey!

VM-expert landed up in jail for planning cyber extortion in New Jersey!

by Duocircle

 

A New Jersey-based core infrastructure engineer at a US industrial firm got arrested as he locked out Windows admins from 254 servers. He was trying to target his employer and, in the process, landed up in prison. Daniel was a specialist in hosting virtual machines or VMs.

(more…)

DKIM alone is not enough

DKIM alone is not enough

 

You might have heard that you do not necessarily need all three email authentication protocols— SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) to create a foolproof defence strategy for your email ecosystem. But here’s a truth that these custodians of security do not tell you: achieving a 100% foolproof email security strategy is very challenging, if not impossible, and you need a multi-layered approach that covers all the bases and helps you stay ahead of these attacks. 

(more…)

SPF alone is not enough

SPF alone is not enough

 

Here’s a question for you: how much security is too much security for your emails? Before you try to answer this question, we would like to remind you that email security threats like phishing, spam, ransomware, malware, and spoofing are not only becoming more frequent but also more grave. The kind of impact these attacks have on the target is often devastating, including financial loss, data breach, and legal consequences. With these threats looming over your email ecosystem, you need a mechanism that is robust and hardy.

(more…)

Public Data Breach, Ransomware Disables Security, Hacker Fakes Death – Cybersecurity News [August 19, 2024]

Public Data Breach, Ransomware Disables Security, Hacker Fakes Death – Cybersecurity News [August 19, 2024]

Public Data Breach, Ransomware Disables Security, Hacker Fakes Death –Cybersecurity News [August 19, 2024]

by Duocircle

 

We’re back with the latest cybersecurity scoop of the week where we’ll take a look at the data breach that occurred at National Public Data, the new malware that disables security software, how a man was sentenced for hacking into the stage registry to fake his death, the $14 million holograph crypto hackers’ arrest, and the charges against Karakurt extortion gang’s member. Stay tuned for more!

(more…)

The risks associated with parked domains- a gateway to grave cyberattacks

The risks associated with parked domains- a gateway to grave cyberattacks

The risks associated with parked domains- a gateway to grave cyberattacks

by Duocircle

 

Brand owners buy domains and park them for several reasons, including future use or development and brand protection. Sometimes, they also buy them because they want to hold onto a name they like or identify with, even if they don’t have the purpose of developing it anytime soon. 

(more…)

SPF=Fail, but the recipient’s mailbox has not quarantined or rejected the email- why?

SPF=Fail, but the recipient’s mailbox has not quarantined or rejected the email- why?

SPF=fail, but the recipient’s mailbox has not quarantined or rejected the email- why?

by Duocircle

 

When an email shows ‘SPF=fail’ but is not blocked by an antispam filter, it can be due to several reasons. Knowing and fixing the issue is important; otherwise, threat actors can exploit the security gap by sending fraudulent emails in your business’ name. 

  (more…)

Enabling Microsoft’s Exchange Online Protection (EOP) phishing policies using the Microsoft Defender portal

Enabling Microsoft’s Exchange Online Protection (EOP) phishing policies using the Microsoft Defender portal

Enabling Microsoft’s Exchange Online Protection (EOP) phishing policies using the Microsoft Defender portal

by Duocircle

 

There is a default anti-phishing policy that is applied to all recipients, but it’s better to create custom policies for better protection. To configure the anti-phishing policies, you need to be assigned permissions in the Microsoft Defender portal. If you have the required permissions, you are good to go ahead and make modifications. 

(more…)

Windows SmartScreen Exploited, Ransomware Leader Arrested, Russian Hacker Sentenced – Cybersecurity News [August 12, 2024]

Windows SmartScreen Exploited, Ransomware Leader Arrested, Russian Hacker Sentenced – Cybersecurity News [August 12, 2024]

Windows SmartScreen Exploited, Ransomware Leader Arrested, Russian Hacker Sentenced – Cybersecurity News [August 12, 2024]

by Duocircle

 

Here we are with cybersecurity latest with our news bulletin. This week, we’ll share all the info on the Windows SmartScreen flaw, the arrest of the Reveton ransomware cartel’s operator, the sentencing of a Russian cybercriminal who stole 300,000 login credentials, the details of the 3AM ransomware breach of Kootenai Health patient data, and fake alerts on X being used as clickbait. Let’s take a look!

(more…)

How do you receive DMARC reports on external email addresses?

Decoding the DMARC adoption wave in Ireland

 

Ever since Google and Yahoo rolled out new email-sending policies that mandate organizations that send bulk marketing emails every day to deploy DMARC (Domain-based Message Authentication Reporting and Conformance), organizations across the world have been quite proactive in meeting these new standards. The wave of DMARC adoption was such that over 800,000 new DMARC records were created by March 2024. And just like the rest of the world, organizations in Ireland also jumped on this bandwagon. 

(more…)

Why does RFC impose the character limit on SPF records?

Why does RFC impose the character limit on SPF records?

 

As per RFC, if an SPF record has more than 255 characters, then it will be invalid. This simply means that such an SPF record would give false positives and negatives– neither of them works in favor of your domain. 

(more…)

What is a quid pro quo attack?

What is a quid pro quo attack?

 

‘Quid pro quo’ is the Latin term that literally means ‘this for that,’ meaning a mutual exchange. Although the term itself doesn’t indicate an illegal act, threat actors leverage this social engineering tactic to offer something valuable or helpful in exchange for information or access to a system. 

(more…)

Windows Update Exploit, Interpol Recovers $40M, Chrome Direct Payments – Cybersecurity News [August 05, 2024]

Windows Update Exploit, Interpol Recovers $40M, Chrome Direct Payments – Cybersecurity News [August 05, 2024]

Windows Update Exploit, Interpol Recovers $40M, Chrome Direct Payments – Cybersecurity News [August 05, 2024]

by Duocircle

 

From the latest Windows update downgrade attack to the recovery of $40 million by Interpol, Google’s new website payment feature, the hack on the classroom management platform, and the US suing TikTok for violating child privacy laws, our weekly cybersecurity bulletin will share the top news that’s making headlines around the world.

(more…)

How do you receive DMARC reports on external email addresses?

The point where DORA and DMARC meet

 

Digital Operational Resilience Act (DORA) is a regulation by the European Union that came into force on January 17, 2023. It makes the financial institutions and entities within the finance sector more resilient towards fraud. It strengthens banks, insurance companies, investment firms, and other financial service providers to get back on their feet after major losses and disruptions. 

(more…)

Understanding the relevance of Secure Email Gateways (SEGs)

Understanding the relevance of Secure Email Gateways (SEGs)

 

Secure Email Gateways (SEGs) are like your email infrastructure’s personal security guards. They ensure only safe and legitimate emails go out from your company, keeping it protected from email-based attacks. The overall practice of deploying SEGs prevents the distribution of malware and phishing attempts through emails, instills trust in your clients and prospects, helps you stay compliant with industry standards, and, most importantly, wards off litigations and financial damages. (more…)

Everything you should know about obtaining a Verified Mark Certificate (VMC)

Everything you should know about obtaining a Verified Mark Certificate (VMC)

Everything you should know about obtaining a Verified Mark Certificate (VMC)

by Duocircle

 

When it comes to ensuring the success of your email campaigns, something that is just as important as the content of the email is the trust it inspires in your recipients. The way the receivers and their mail servers perceive your emails tells a lot about your brand’s identity and credibility

(more…)

TryCloudflare Malware Spread, FBI Scam Alert, Azure Outage Triggered-Cybersecurity News [July 29, 2024]

TryCloudflare Malware Spread, FBI Scam Alert, Azure Outage Triggered-Cybersecurity News [July 29, 2024]

TryCloudflare Malware Spread, FBI Scam Alert, Azure Outage Triggered-Cybersecurity News [July 29, 2024]

by Duocircle

 

This week’s latest scoop in cybersecurity will take you to the TryCloudflare exploitation for deploying RATs, the new FBI warning about scammers impersonating crypto exchanges, the MS Azure outage details, new features on Google Chrome against infostealers, and the security gap in Whatsapp for Windows that allows threat actors to run malicious scripts without alerts. Stay tuned to learn more about these and how to stay safe!

(more…)

Pin It on Pinterest