Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

Cyberattacks Targeting Institutions, Treasury Security Alarms, Telecom Network Breach – Cybersecurity News [January 20, 2025]

by DuoCircle

 

This week, in our ongoing coverage of cybersecurity news, we take a closer look at recent cybersecurity news, threats, and innovative solutions impacting the virtual landscape. We tried covering everything ranging from coordinated cyberattacks on municipalities and banks to growing national security fears as we examined the vulnerabilities that threaten critical sectors. We’ll also cover why ransomware is such a growing threat to critical infrastructure and how co-opetition is becoming a major theme in cybersecurity. We will conclude with a highlight of the strategic alliance between Cognizant and CrowdStrike that enhances enterprise defense against emerging cyber threats.

(more…)

VeriSend SaaS

VeriSend SaaS

Building Brand equity over time is very expensive and valuable. Bad actors spoof these well-known brands to attempt to steal from unsuspecting people who believe the email is coming from a known Brand.

 

VeriSend is a software-as-a-service designed to be an independent third-party verification system that allows email providers the ability to add Brand logos to email messages.

We maintain a service that allows mail providers to display valid Brand logos when legitimate mail is received.

VeriSend protects the brand by displaying the Brand’s logo for Valid EMail.

Mail recipients know to “look for the logo”. If they see the Brand logo, they can trust the message is from their favorite brand.

Conversely, it they do not see the Brand logo, it is a fake message, 100% of the time!

Look for the Logo

Look for the Logo

Verisend Verification

Each Verified Email will have common elements to help the recipient know that the message is legitimate.

The first element is the Brand logo of the sender. In this example, GoDaddy is the legitimate sender.

The second element is the name of the Brand Sender, Go Daddy

The third brand element is an active link to the website of the Brand Sender. This link is curated and always safe to click.


Verified Brand Email

The Verified Sender logo is our seal and proof to the recipient that this message is legitimately from the Brand sender.

Restoring Confidence to Email with Verifiable Sender Identities

Email is a wonderful way to communicate and a fantastic business tool that allows nearly instantaneous delivery at near zero cost.

Unfortunately, anonymity and forgery have restricted the full potential of email to be a trusted method deliver a wide variety of information.

I have been working for 3 years to use verifiable message metadata cross referenced against a Library of Known Good Senders assists in 100% sure identification of Good Senders and of individual messages.

Read my whitepaper here:

Verisend: Restoring Confidence to Email with Verifiable Sender Identities

Understanding the concept of fallback mechanisms in Sender Policy Framework

Understanding the concept of fallback mechanisms in Sender Policy Framework

Understanding the concept of fallback mechanisms in Sender Policy Framework

by DuoCircle

 

Sometimes, when an email doesn’t pass the SPF authentication checks, the receiving server or policies offer better ways to handle or mitigate the failure. This is done using fallback mechanisms— a way to secure email communication without hampering the flow and productivity (more…)

Yahoo Japan has mandated DMARC and domain authentication

Yahoo Japan has mandated DMARC and domain authentication

 

In November 2023, Yahoo announced that by February 1st, 2024, any company that sends more than 5,000 emails per day has to deploy DMARC to minimize the risk of email-based spoofing, phishing, and ransomware. After this announcement, the rate of DMARC adoption surged, and now Yahoo Japan has also made DMARC and domain authentication mandatory for users as of December 2024. Experts see this as a great opportunity to improve companies’ email security posture. (more…)

Is your DMARC enforcement strict enough?

Is your DMARC enforcement strict enough?

 

Back in 2024, email service providers such as Google and Yahoo rolled out new email-sending policies. One would have thought that organizations would begin to take email security more seriously, but so far, that hasn’t been the case. In fact, cybersecurity experts have found that phishing attacks have shot up, with the number of phishing messages increasing by 202% in the second half of 2024.

(more…)

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

New PhishWP Threat, Illicit Marketplace Live, Codefinger Targets AWS – Cybersecurity News [January 13, 2025]

by DuoCircle

 

Cybercriminals are enhancing their capabilities, as evidenced by the latest PhishPWP phishing threat. Similarly, this week’s cybersecurity bulletin highlights the latest ransomware attack on AWS servers, making recovery impossible without the attacker’s key. We also look at how cybercriminals use popular social media channels like Telegram. Zero-day attacks are the most dangerous of all, as they emerge from practically nowhere. This week’s news highlights one such attack on Fortinet FortiGate firewall users. Finally, we round off a reputed university shutting off classes, fearing a cyber-attack on its network.    

(more…)

Gmail security requirements for brands and businesses

Gmail security requirements for brands and businesses

 

Gmail is one of the best email service providers in the world. Gmail has managed to beat all the competition because of its state-of-the-art features and seamless integration with other Google services. With a whopping user base of 1.8 billion, Gmail focuses extensively on security requirements and restrictions in order to enhance user safety and data privacy.

(more…)

Pin It on Pinterest