Cybersecurity Bi-weekly Roundup: Week of 24th July 2021

A bi-weekly roundup of the latest cybersecurity news and research. Halfway down the week and we’ve got you covered till the weekend on the what’s and nots in the world of cybersecurity. Without any further ado, let’s talk about the most talked about topic of the town – OLYMPICS. As much as we all love […]

5 Steps your e-commerce website needs today to stay secure

What is an E-commerce Website? E-Commerce websites in simple words are basically online portals that facilitate online transactions of goods and services through means of the transfer of information and funds over the Internet. In the early days, e-commerce was done partially through emails and phone calls. Now, within a click’s reach any single website, […]

How to do DMARC Deployment easily in 2021?

What Is DMARC? Domain-based Message Authentication, Reporting & Conformance, or DMARC, is a protocol that uses Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) to determine the authenticity of an email message. It makes it easier for Internet Service Providers (ISPs) to prevent malicious email practices, such as domain spoofing, to phish recipients’ personal […]

Why am I receiving spam mail from my own domain?

Spam Mailing is a form of mischief where one abuses your email address and is only one of many techniques spammers use to throw their bugs into our mailboxes. Since the beginning of mails, anyone can send email to anyone around the globe, within seconds, at zero apparent cost. Apparently what seemed to be the […]

What is BIMI? How it can enhance your brand protection?

With phishing, spoofing, and fraudulent emails on the rise, recipients are increasingly suspicious of messages in their inbox. It has become crucial to have more protection. To add another layer of email protection (and to build brand visibility), that’s where BIMI jumps in with it’s all new standards of protection and promises to take consumer […]

Rogue Applications: The problem and solution

Rogue Applications might be the fastest-growing phenomenon among cybercriminals. They’re a constant problem in unauthorized and authorized mobile app stores, including Google Play and the App Store. Here’s a wider look at the topic. What are Rogue Applications? Rogue Applications are counterfeit apps designed to duplicate those of trusted brands. Financial institutions of all kinds […]

Secure Configuration Review

“As each organisation’s IT system is different” regardless of how it looks, any mistakes when it comes to the Installation or Configuration of Networks, Servers, and other Infrastructure can cause a ripple effect through your entire organisation. Therein security of network devices is crucial for the operations of an organization. A single compromise may result […]

Domain Spoofing : Mitigation

There was a time, when mail spoofing was an art, was a thing to impress people, was a way to phish attack someone.With increasing intelligence in spam filters – it became harder, you need good IP reputation to deliver mail to box.But now it has become almost impossible to spoof address like [email protected] . Why […]

Wisdom – DMARC Deployment

Deploy SLOWLY, We strongly recommend ramping up DMARC use slowly by employing these policies in this order. First, monitor your traffic and look for anomalies in the reports, such as messages that are not yet being signed or are perhaps being spoofed. Then, when you’re comfortable with the results, change the TXT record policy setting […]

“Mail from” and “From” header

In simple terms MAIL FROM – Mr.Blue used XYZ post office to send a mail envelope to Mr.Red, and if Mr.Red’s post office cant locate Mr. Red then the envelope can be sent back to XYZ Post office to be returned to Mr.BlueFROM – This message is FROM Mr.Blue to Mr. Red (Receiver). Now the technical […]

Scroll to top