Red Sift’s Winter ‘24/’25 Quarterly Product Release

This quarter, we’re making security faster, smarter, and more proactive with updates that improve threat detection, reduce manual work, and prevent threats before they escalate.

Highlights include:

  • AI-driven Executive Impersonation detection in Red Sift Brand Trust, helping you proactively flag and mitigate leadership impersonation threats.
  • Enhanced DMARC forensics in Red Sift OnDMARC thanks to an exclusive Abusix data feed, giving deeper insight into shadow IT and phishing campaigns.
  • Red Sift Certificates Lite, the only Let’s Encrypt-recommended free certificate monitoring service with PKI posture metrics and proactive alerts.

Brand Trust 

Executive Impersonation: Detect unauthorized use of leadership identities

By uploading and managing executive images in Brand Trust, security teams can detect and monitor unauthorized use of leadership identities across lookalike domains, preventing brand impersonation, phishing scams, and fraud.

Once an executive image is added to Brand Trust, the platform scans for impersonation attempts and flags detections in the Activity page. If a match is found, the risk rating will reflect the severity—typically high, unless the domain appears to be owned by your organization.

To see a quick walkthrough of this new feature, check out the video below.

Automated triaging: Focusing your attention where it matters most

Managing lookalike domains can be overwhelming, but with automated triaging, your workflows become more streamlined. This feature automatically classifies low-risk lookalikes, allowing you to prioritize higher-risk domains without losing track of potential threats. Key benefits include:

  • Prioritize critical threats: Automatically classify low-risk lookalikes, allowing you to concentrate on higher-risk domains.
  • Optimize time and resources: By automating routine triaging tasks, you can dedicate more time to strategic, high-value activities.
  • Continuous monitoring and reassessment: Low-risk lookalikes are not forgotten – they remain under constant surveillance, and if new risks are detected, they are flagged for your review.
  • Customizable rules: Tailor the classification system to fit your organization’s unique risk criteria.


The Automated Triaging feature is part of our ongoing commitment to empower your brand protection efforts. We plan to introduce additional automation capabilities to further enhance your ability to manage threats effectively and efficiently.

Ageing out lookalikes: Keeping your monitoring focused

Lookalike domains that no longer pose a threat can clutter your monitoring system, making it harder to focus on actionable risks. The ageing out lookalikes feature automatically removes expired or inactive domains from your active monitoring list. Key functionality includes:

  • Automatic cleanup: Domains that expire or show no activity are aged out, keeping your monitoring streamlined.
  • Reassessment on activity: If a domain is re-registered or becomes active again, it’s automatically re-added for review.
  • Full historical access: The aged-out lookalikes page provides a complete history of removed domains, including details like deletion dates and remaining time before permanent removal.
  • One-click restoration: Quickly restore aged-out domains to the low-risk tab if you want to resume monitoring.

This feature ensures your monitoring efforts remain focused, reducing noise while maintaining flexibility to reassess emerging risks.

OnDMARC

Enhanced Forensics: Deeper visibility with the new Abusix data feed

We’ve enhanced our Forensics feature with a new data feed from Abusix, an exclusive enhancement that provides deeper insights into shadow IT and phishing threats. As the only DMARC vendor offering this level of enriched forensics, we now combine data from both Yahoo and Abusix, giving you unparalleled visibility into unauthorized sending sources and malicious campaigns.

What this means for you:

  • Get to DMARC enforcement faster: With additional intelligence beyond standard DMARC reports, you can quickly identify all sending sources, shut down shadow IT, and move to enforcement with confidence.
  • Stronger phishing and spoofing detection: Even at p=reject, gain visibility into phishing campaigns impersonating your brand, uncover phishing URLs, and deliver actionable IOCs to your SOC team.

How does it work? 

Enhanced Forensics are extracted from the terabytes of data Red Sift processes from global trap networks. These are securely synthesized into DMARC-compatible forensics reports that can provide additional context on unauthorized activity and attack patterns.

Enhanced Forensics can be found on the Forensics details page under ‘Enhanced’. When the value is ‘true,’ it indicates that the forensic data has been augmented with data from Yahoo and Abusix.

Saved view alerts: Proactive notifications tailored to you

Keeping up with DMARC activity across multiple domains just got easier. You can now set up alerts based on your saved views in the Senders table. Whether you want updates on specific categories, domains, or behaviors, alerts can be customized to your needs, sent to multiple recipients, and scheduled for daily or weekly notifications.

This added functionality ensures you’re always in the loop, with proactive notifications enabling faster response times and greater control over your DMARC enforcement journey.

Red Sift Certificates 

Red Sift Certificates Lite: Free monitoring and 7-day expiration alerts

We’re excited to have launched Red Sift Certificates Lite, our free tier of Red Sift Certificates Enterprise, which monitors up to 250 certificates, provides PKI posture metrics, and sends email alerts seven days before expiration.

Certificates Lite is the recommended certificate monitoring service by Let’s Encrypt, helping you stay ahead of potential outages and maintain uninterrupted service. It’s a simple but powerful safety net that makes proactive management accessible to everyone.

To get the full scoop from our CEO, read the announcement post here. If you’d like to get started with free expiration monitoring, click here.

Active certificates details page: Comprehensive certificate insights

Managing certificate chains is easier than ever with new enhancements to our active certificates details page:

  • You can now view full certificate chain details, including root, intermediate, and leaf certificates, making it simple to spot broken chains or misconfigurations.
  • Detailed OpenSSL certificate data is now displayed, giving you transparency into key attributes like validity periods, key usages, and SANs.
  • A new PEM tab allows you to access raw Base64-encoded certificates for manual operations or integrations.

These updates put deeper insights at your fingertips, enabling faster troubleshooting, improved auditing, and stronger trust management across your infrastructure.

Network scanning: Flexibility and precision in asset monitoring

Our updated network scanning settings now offer precise control over how scans are performed, with separate configurations for static network ranges and dynamic IP addresses. You can also define exclusions to fine-tune your scanning approach.

While changes to these settings may take up to 24 hours to take effect due to the daily scan schedule, once scanning is active, new information is continuously and automatically added to your account in real time. These improvements allow you to efficiently monitor both fixed and transient assets across your infrastructure, ensuring no gaps in your visibility.

PUBLISHED BY

Francesca Rünger-Field

3 Mar. 2025

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Over 60% of healthcare organizations remain unprotected against data breaches

Sean Costigan

Introduction Red Sift’s analysis of healthcare organizations that reported large breaches to the Department of Health & Human Services (HHS) in 2023-2024 uncovered a troubling trend: post-breach, 61% remain unprotected against phishing and domain spoofing due to weak or nonexistent DMARC policies. DMARC (Domain-based Message Authentication, Reporting & Conformance) is a widely recognized security…

Read more
Awards

Red Sift wins 2025 Cybersecurity Excellence Award for OnDMARC

Jack Lilley

Executive Summary: Red Sift OnDMARC has been recognized with the 2025 Cybersecurity Excellence Award for its advanced email security solutions. By leveraging AI-powered tools like Red Sift Radar for security issues and Dynamic DNS Guardian for real-time monitoring, OnDMARC provides businesses with robust protection against phishing, spoofing, and business email compromise (BEC).  Key takeaways:…

Read more
Product Release

Red Sift’s Winter ‘24/’25 Quarterly Product Release

Francesca Rünger-Field

This quarter, we’re making security faster, smarter, and more proactive with updates that improve threat detection, reduce manual work, and prevent threats before they escalate. Highlights include: Brand Trust  Executive Impersonation: Detect unauthorized use of leadership identities By uploading and managing executive images in Brand Trust, security teams can detect and monitor unauthorized use…

Read more
AI

Enhanced logo detection with AI: A hybrid approach

Phong Nguyen

Executive Summary: Accurate logo detection is essential for protecting brands against misuse and fraudulent activities. Red Sift’s hybrid AI approach enhances detection precision, effectively balancing the reduction of false positives with the identification of genuine threats. This article: Introduction Logo detection is crucial for brand protection, helping identify logo misuse in lookalike domains and fraudulent…

Read more