 Email authentication continues to improve, but DMARC is still widely misunderstood and often misused. The number of domains publishing DMARC records has grown steadily since 2023, especially in industries like finance, education, and healthcare. However, a large percentage of those domains are not enforcing any policy, which means spoofing and phishing attacks are still a serious concern.
Email authentication continues to improve, but DMARC is still widely misunderstood and often misused. The number of domains publishing DMARC records has grown steadily since 2023, especially in industries like finance, education, and healthcare. However, a large percentage of those domains are not enforcing any policy, which means spoofing and phishing attacks are still a serious concern.
Adoption is up, but enforcement remains low. Estimates show that while more than 30 percent of domains have added DMARC over the past two years, fewer than a third are using policies like quarantine or reject. Most records are set to “none,” which enables monitoring but provides no actual protection against domain impersonation. It’s a good first step, but without enforcement, DMARC doesn’t prevent malicious email from being delivered. [Read more…]
 Security researchers have identified two major exploits in the Secure Boot system, both capable of sidestepping one of the most important protections on modern PCs. Microsoft has issued a patch for one of them. The other remains untouched, even as it offers attackers a nearly universal method to bypass security during the startup process.
Security researchers have identified two major exploits in the Secure Boot system, both capable of sidestepping one of the most important protections on modern PCs. Microsoft has issued a patch for one of them. The other remains untouched, even as it offers attackers a nearly universal method to bypass security during the startup process. Hackers posing as IT support are targeting employees at large companies to sneak into their Salesforce systems and steal data. They start with a phone call, pretending to help with a routine issue. The real goal? To get the employee to connect to a fake version of Salesforce’s Data Loader tool. Once that happens, the attackers can quietly grab sensitive company data.
Hackers posing as IT support are targeting employees at large companies to sneak into their Salesforce systems and steal data. They start with a phone call, pretending to help with a routine issue. The real goal? To get the employee to connect to a fake version of Salesforce’s Data Loader tool. Once that happens, the attackers can quietly grab sensitive company data. Researchers have uncovered a batch of malicious packages in the NPM repo that quietly racked up over 6,000 downloads before anyone noticed. These weren’t your typical cryptominers or info-stealers. They were designed to crash systems, wipe files, and corrupt data—sometimes all at once.
Researchers have uncovered a batch of malicious packages in the NPM repo that quietly racked up over 6,000 downloads before anyone noticed. These weren’t your typical cryptominers or info-stealers. They were designed to crash systems, wipe files, and corrupt data—sometimes all at once. The crew behind the 3AM strain of ransomware has been hitting companies using a familiar playbook: flood the target with junk emails, follow up with a fake IT call, and convince someone to hand over remote access. It’s not new, but it still works. Probably more than it should.
The crew behind the 3AM strain of ransomware has been hitting companies using a familiar playbook: flood the target with junk emails, follow up with a fake IT call, and convince someone to hand over remote access. It’s not new, but it still works. Probably more than it should.