In recent weeks, there have been reports of sophisticated phishing attacks disguised as official communication from the cryptocurrency platform, Coinbase. These phishing emails closely mimic Coinbase’s branding and language to build recipient trust and prompt clicks on malicious links. The subject lines of these emails generally follow a format: the sender’s address starts with either…Continue Reading: Boosting email security amid recent Coinbase phishing attempts
email security
Behind the Screens: North Korea’s Focus on DMARC in Email Espionage
If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered. Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North Korean…Continue Reading: Behind the Screens: North Korea’s Focus on DMARC in Email Espionage
Why successful email marketing relies on domain authentication
How to master the essentials of email security for optimal campaign reach and inbox placement Crafting the perfect email marketing campaign is hard work. And, nothing is more frustrating than a perfectly crafted campaign not performing because the emails were delivered to the the spam folder. In 2023, Validity found that one in every six…Continue Reading: Why successful email marketing relies on domain authentication
2024: The year of DMARC as a business imperative
I can say with confidence that the world does not need more security predictions for 2024. But as we head into the new year, it is important to have conversations about security strategy to inform our business priorities and our road maps. As I talk to our Red Sift customers, our partners, and the thought…Continue Reading: 2024: The year of DMARC as a business imperative
What is a DKIM Replay Attack?
Malicious actors are always exploring new ways to access email inboxes. Over the past few years, cyber criminals have been using a method known as a ‘DKIM Replay Attack’, in which high reputation mailboxes are used to generate a legitimate message signature, which can then be amplified (or replayed) multiple times to send spam messages…Continue Reading: What is a DKIM Replay Attack?
What’s the difference between SMTP, IMAP, and POP3 email protocols?
Emails are an inevitable part of today’s corporate and personal life. But do you know what mechanisms a standard mail exchange process follows? Well, multiple elements are included, like email protocols, email service providers, mail user agents (MUAs), message submission agents (MSAs), mail delivery agents (MDAs), etc. …Continue Reading: What’s the difference between SMTP, IMAP, and POP3 email protocols?