DKIM

La Poste annonce de nouvelles exigences d’authentification des e-mails pour tous les expéditeurs

La Poste (laposte.net) a annoncé aujourd’hui des changements importants à ses exigences d’authentification des e-mails qui entreront en vigueur en septembre 2025. Ces nouvelles exigences changeront fondamentalement la façon dont les e-mails sont traités et livrés aux adresses e-mail de La Poste. Qu’est-ce qui change ? À partir de septembre, La Poste mettra en place…Continue Reading: La Poste annonce de nouvelles exigences d’authentification des e-mails pour tous les expéditeurs

La Poste announces new email authentication requirements for all senders

La Poste (laposte.net) has today announced significant changes to its email authentication requirements that will take effect in September 2025. These new requirements will fundamentally change how emails are processed and delivered to La Poste email addresses. What’s changing? Starting in September, La Poste will implement strict email authentication protocols that will affect all senders….Continue Reading: La Poste announces new email authentication requirements for all senders

New Zealand moves to mandate DMARC enforcement

Executive summary: New Zealand’s Secure Government Email Framework mandates DMARC at p=reject—plus hard-fail SPF, universal DKIM, enforced MTA-STS, and TLS-RPT—by October 2025. The rules replace SEEMail, curb soaring phishing losses, and affect every organization that emails the public sector. Key takeaways: The New Zealand Government has recently published the Secure Government Email (SGE) Common Implementation Framework,…Continue Reading: New Zealand moves to mandate DMARC enforcement

The hidden threat: How misconfigured DKIM enables replay attacks

Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys (signing too little of the message)…Continue Reading: The hidden threat: How misconfigured DKIM enables replay attacks