La Poste (laposte.net) a annoncé aujourd’hui des changements importants à ses exigences d’authentification des e-mails qui entreront en vigueur en septembre 2025. Ces nouvelles exigences changeront fondamentalement la façon dont les e-mails sont traités et livrés aux adresses e-mail de La Poste. Qu’est-ce qui change ? À partir de septembre, La Poste mettra en place…Continue Reading: La Poste annonce de nouvelles exigences d’authentification des e-mails pour tous les expéditeurs
DKIM
La Poste announces new email authentication requirements for all senders
La Poste (laposte.net) has today announced significant changes to its email authentication requirements that will take effect in September 2025. These new requirements will fundamentally change how emails are processed and delivered to La Poste email addresses. What’s changing? Starting in September, La Poste will implement strict email authentication protocols that will affect all senders….Continue Reading: La Poste announces new email authentication requirements for all senders
New Zealand moves to mandate DMARC enforcement
Executive summary: New Zealand’s Secure Government Email Framework mandates DMARC at p=reject—plus hard-fail SPF, universal DKIM, enforced MTA-STS, and TLS-RPT—by October 2025. The rules replace SEEMail, curb soaring phishing losses, and affect every organization that emails the public sector. Key takeaways: The New Zealand Government has recently published the Secure Government Email (SGE) Common Implementation Framework,…Continue Reading: New Zealand moves to mandate DMARC enforcement
The hidden threat: How misconfigured DKIM enables replay attacks
Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys (signing too little of the message)…Continue Reading: The hidden threat: How misconfigured DKIM enables replay attacks
First look at DKIM2: The next generation of DKIM
In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for a…Continue Reading: First look at DKIM2: The next generation of DKIM
What is a DKIM Replay Attack?
Malicious actors are always exploring new ways to access email inboxes. Over the past few years, cyber criminals have been using a method known as a ‘DKIM Replay Attack’, in which high reputation mailboxes are used to generate a legitimate message signature, which can then be amplified (or replayed) multiple times to send spam messages…Continue Reading: What is a DKIM Replay Attack?