What are the different phases of DMARC deployment?
by Duocircle
With sophisticated cyberattacks looming over your email landscape, you need to employ the latest techniques that not only protect your communications but also enhance the security posture, and DMARCfits the bill! Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps you do just that! It protects your domains against spoofing, phishing, and other email-based frauds.
We’re back with the latest cybersecurity scoop of the week that will keep you privy to the latest attacks and help you stay safe. This week, we’ll take a look at how hackers are leveraging the WPS office to spread malware, the withdrawal of Notion from Russia, how Uber was fined $325 million for illegal data transfers, the Tickler malware attacking US government systems, and the FBI’s report on RansomHub ransomware’s 210 victims and the tactics used. Let’s take a look!
VM-expert landed up in jail for planning cyber extortion in New Jersey!
by Duocircle
A New Jersey-based core infrastructure engineer at a US industrial firm got arrested as he locked out Windows admins from 254 servers. He was trying to target his employer and, in the process, landed up in prison. Daniel was a specialist in hosting virtual machines or VMs.
You might have heard that you do not necessarily need all three email authentication protocols— SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) to create a foolproof defence strategy for your email ecosystem. But here’s a truth that these custodians of security do not tell you: achieving a 100% foolproof email security strategy is very challenging, if not impossible, and you need a multi-layered approach that covers all the bases and helps you stay ahead of these attacks.
Here’s a question for you: how much security is too much security for your emails? Before you try to answer this question, we would like to remind you that email security threats like phishing, spam, ransomware, malware, and spoofing are not only becoming more frequent but also more grave. The kind of impact these attacks have on the target is often devastating, including financial loss, data breach, and legal consequences. With these threats looming over your email ecosystem, you need a mechanism that is robust and hardy.
Emails were and still are a crucial tool for business communication and marketing.
A report by Statista revealed that in 2023, about 347 billion emails were sent and received globally daily. That figure is projected to increase to about 392 billion daily emails by 2026.
Public Data Breach, Ransomware Disables Security, Hacker Fakes Death –Cybersecurity News [August 19, 2024]
by Duocircle
We’re back with the latest cybersecurity scoop of the week where we’ll take a look at the data breach that occurred at National Public Data, the new malware that disables security software, how a man was sentenced for hacking into the stage registry to fake his death, the $14 million holograph crypto hackers’ arrest, and the charges against Karakurt extortion gang’s member. Stay tuned for more!
The risks associated with parked domains- a gateway to grave cyberattacks
by Duocircle
Brand owners buy domains and park them for several reasons, including future use or development and brand protection. Sometimes, they also buy them because they want to hold onto a name they like or identify with, even if they don’t have the purpose of developing it anytime soon.
SPF=fail, but the recipient’s mailbox has not quarantined or rejected the email- why?
by Duocircle
When an email shows ‘SPF=fail’ but is not blocked by an antispam filter, it can be due to several reasons. Knowing and fixing the issue is important; otherwise, threat actors can exploit the security gap by sending fraudulent emails in your business’ name.
Enabling Microsoft’s Exchange Online Protection (EOP) phishing policies using the Microsoft Defender portal
by Duocircle
There is a default anti-phishing policy that is applied to all recipients, but it’s better to create custom policies for better protection. To configure the anti-phishing policies, you need to be assigned permissions in the Microsoft Defender portal. If you have the required permissions, you are good to go ahead and make modifications.