email security

Boosting email security amid recent Coinbase phishing attempts

In recent weeks, there have been reports of sophisticated phishing attacks disguised as official communication from the cryptocurrency platform, Coinbase. These phishing emails closely mimic Coinbase’s branding and language to build recipient trust and prompt clicks on malicious links. The subject lines of these emails generally follow a format: the sender’s address starts with either…Continue Reading: Boosting email security amid recent Coinbase phishing attempts

Behind the Screens: North Korea’s Focus on DMARC in Email Espionage

If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered.  Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North Korean…Continue Reading: Behind the Screens: North Korea’s Focus on DMARC in Email Espionage

Why successful email marketing relies on domain authentication

How to master the essentials of email security for optimal campaign reach and inbox placement Crafting the perfect email marketing campaign is hard work. And, nothing is more frustrating than a perfectly crafted campaign not performing because the emails were delivered to the the spam folder.  In 2023, Validity found that one in every six…Continue Reading: Why successful email marketing relies on domain authentication

What’s the difference between SMTP, IMAP, and POP3 email protocols?

Emails are an inevitable part of today’s corporate and personal life. But do you know what mechanisms a standard mail exchange process follows? Well, multiple elements are included, like email protocols, email service providers, mail user agents (MUAs), message submission agents (MSAs), mail delivery agents (MDAs), etc. …Continue Reading: What’s the difference between SMTP, IMAP, and POP3 email protocols?