Tenant-to-tenant migration in Office 365 involves transferring data, applications, and configurations from one Microsoft 365 tenant to another, often during mergers or organizational changes. Key considerations include understanding your business scenario, selecting the appropriate migration approach (single event vs. phased), addressing domain management challenges, and utilizing reliable third-party tools for a smooth transition.
The internet never sleeps and halts, and neither do cyber threats and its malicious actors. This week, sneaky apps tricked millions, hackers pulled off a clever email scam, and a big ransomware attack hit critical systems. Meanwhile, Google is making a massive security move, and Telegram’s CEO is caught up in legal trouble. Here’s everything you need to know about the latest in cybersecurity!(more…)
How do threat actors use SPF policies in BEC attacks?
by DuoCircle
Business email compromise, or BEC, is a sophisticated phishing attack conducted primarily through a combination of social engineering and deception to get access to sensitive data, files, systems, networks, etc. It’s attempted mainly by impersonating a company’s C-suite, instructing executives to share data, or authorizing fraudulent wire transfers. For example- an executive receiving an email from a scammer pretending to be their boss, urgently asking them to buy gift cards and sharing the codes. They think it’s real, but it’s actually a trick to steal money!
The best email security solutions for Managed Service Providers include Barracuda Email Protection, which combines AI-powered security with web protection and data safeguards, as well as Avanan, known for its multi-platform security features. MSPs should evaluate solutions based on their ability to protect against various threats, ease of management, and scalability to support multiple clients effectively.
There are plenty of communication channels out there, but the one that has stayed and created the most significant impact on businesses is email. You might agree with us when we say that email is indispensable when it comes to connecting your brand to your clients.
Email sending services are platforms that facilitate the management and delivery of transactional and marketing emails for businesses, ensuring high deliverability rates. These services often include features such as robust APIs, dynamic email templates, and user management capabilities, all designed to enhance communication efficiency and engagement with customers.
Is DKIM2 the next chapter in email authentication?
by DuoCircle
The current version of DKIM (DomainKeys Identified Mail) that you might be using was introduced in 2011. A lot has happened in the cybersecurity world since then. Indeed, we have evolved a lot, but so have the hackers! They’ve become smarter, employing sophisticated tricks to impersonate emails, steal data, and scam companies.
With the rise of remote work, ensuring secure email communication has never been more critical. Cyber threats continue to evolve, making it essential for businesses and remote employees to adopt robust email security measures. Whether you are an organization managing a distributed workforce or an individual working remotely, understanding and implementing best practices for secure email communication can protect sensitive information and prevent cyberattacks.
BIMI enhances email security by allowing brands to display their logos alongside authenticated emails, which helps recipients easily identify legitimate communications and reduces the risk of phishing attacks. To implement BIMI effectively, brands must first establish DMARC (Domain-based Message Authentication, Reporting & Conformance) to prevent domain spoofing and ensure that their emails are properly authenticated.
Every business faces risk. A lawsuit, a contract dispute, or poor financial management can threaten its survival. Without proper protection, owners may lose assets or struggle to recover from legal and financial setbacks.
This week’s bulletin highlights some serious incidents that could impact individuals and businesses alike. From hackers spreading malware through NPM packages to cryptocurrency-stealing schemes, cybercriminals are finding new ways to trick people and exploit vulnerabilities. You can stay informed, stay cautious, and take action to protect yourself from these threats with our detailed coverage.
Encryption vs hashing– breaking down the differences
by DuoCircle
Encryption and hashing are the two fundamental techniques of the digital landscape. These are used to protect the integrity and authenticity of data so that threat actors don’t steal or intercept it. At first glance, these two terms may seem the same, which is why many people use them interchangeably. However, they serve distinct purposes and operate in entirely different ways. While encryption is used when you want to secure data by making it unreadable to unauthorized users, hashing does the job of verifying data integrity by generating a unique fingerprint.
An SMTP open relay is a mail server configuration that allows users to send emails through the server without authentication, making it vulnerable to exploitation by spammers for sending unsolicited emails. This practice not only leads to increased spam activity but can also compromise the server’s reputation and deliverability rates, necessitating robust security measures to prevent unauthorized access.
These days, there’s so much talk about the classic technique of deception— phishing. Almost every day, you hear stories, read headlines, and even experience how cyber crooks deceive unassuming users into giving sensitive information, downloading a malicious file, or clicking on a fake link. These attackers usually make their way into your systems through fake emails pretending to be from your bank, text messages warning about “suspicious activity,” or phone calls from scammers claiming to be customer service representatives.
But would you believe us when we say that these cyberattackers were not always this savvy or proactive in their deception techniques? Or were they ahead of their time to pull off such devious tricks even in the early days of the internet?
Whatever might be the case, one thing is clear: phishing attacks have come a long way since they were first launched in the mid-1990s. What began as basic, mass-email fraud replete with misspellings and generic language has now evolved into sophisticated attacks that leverage advanced technology and social engineering to manipulate even the most vigilant users.
Let us take a look at how we have come so far (not for the good, though)!
Where did we get the name “phishing” from?
The word “phishing” is derived from the sport “fishing”. Just as a fisherman uses bait to hook fish, attackers exploit fake emails, websites, or messages to trick individuals into providing sensitive information. The moment the victim falls for the bait by clicking on an infected link, entering their login details, or downloading an infected file, the attacker can retrieve financial accounts, hijack identities, or download malware on their computer.
The “ph” in phishing comes from “phreaking,” an early kind of hacking that focused on breaking into telephone systems. John Draper and other hackers popularized the term after they discovered means of exploiting telecommunication networks. Cybercriminals later borrowed similar fake tactics for the internet, giving birth to today’s phishing attacks.
Since then, phishing has evolved into one of the most frequent and perilous cybersecurity attacks. So, it is very important that individuals and companies constantly have their guards up and are extremely vigilant when on the internet.
How did phishing start?
Phishing has been around for many years, but its origins date back to the 1990s when AOL (America Online) was among the largest online platforms. The hackers saw it as an opportunity, capitalized on it, and began to deceive AOL users by impersonating screen names to obtain their login credentials, passwords, and credit card data.
As the internet became more popular and accessible and emails became more prevalent, spammers changed their tactics. They no longer just employed false screen names, but they sent fake emails mimicking reputable companies. They would dupe individuals into clicking on forged links and giving personal details, similar to the phishing attacks we know today.
Phishing has evolved over the years to be more sophisticated and targeted. Today, we have various types, such as:
Spear phishing – These are targeted attacks on individuals or organizations.
Vishing – These scams happen over the phone, posing as customer service or tech support.
Angler phishing – In angler phishing, the attackers spoof social media messages that trick users into divulging information.
Whaling – These attacks on high-level executives or decision-makers are designed to steal sensitive company information or financial data or gain access to critical systems.
How did phishing attacks evolve?
Nowadays, the phishing attacks you are familiar with are far more advanced than they used to be. In the past, they were simpler to identify and avoid, but now, regardless of how proactive or alert you are, you can still become a victim of a well-designed phishing attack.
Let us see how the phishing attacks turned into the cybersecurity threat we see today:
The Love Bug of 2000
On May 4, 2000, people around the world received an email that said “ILOVEYOU” in the subject line. The message inside was simple: “Kindly check the attached LOVELETTER coming from me.” It seemed personal and harmless, so many people opened the attachment without thinking twice. But what they didn’t know was that this so-called “LOVELETTER” was actually a dangerous computer virus. As soon as someone opened the attachment, the virus started overwriting important files on their computer and spreading itself by emailing a copy to everyone in their Outlook contact list.
This virus, later called the “LoveBug”, was a game-changer in cybercrime. It showed how hackers could exploit both human curiosity and security weaknesses to spread malware quickly. The attack led to widespread chaos across the globe, infecting millions of machines. It was proof that phishing was not just a matter of password theft—it could also be used to seriously compromise entire systems.
Modern-day phishing attacks
The first attack of 2000 was an email-based scam, but today, these attacks have spread far beyond emails. They have made their way into text messages, phone calls, social media, etc.
Attackers now impersonate legitimate businesses, government agencies, or even friends, with forged accounts and compelling texts to trick people into revealing personal information. These scams are no longer just simple emails with poor grammar—many phishing attempts nowadays are so sophisticated that even tech-savvy users fall prey to them.
That’s not all; they have also refined their ways to make their attacks more convincing and highly targeted. Instead of sending the same run-off-the-mill message to their targets, they now customize their attacks based on the victim’s personal information. This makes you believe that the message was meant for you and persuades you to engage with it.
Now you know that phishing attacks are everywhere, and the attackers try to stay one step ahead by constantly polishing their techniques. But that doesn’t mean you should fall behind! Up your cybersecurity game by deploying security protocols like SPF, DKIM, and DMARC for your outgoing emails. These protocols not only authenticate your emails but also prevent cyberattackers from misusing your domain to carry out malicious phishing attacks.
Need help implementing DMARC for your domain? DuoCircle has you covered! Get in touch with us to book your demo today!
A permerror in SPF indicates that there is a permanent error with the Sender Policy Framework (SPF) records, preventing proper interpretation of your domain’s email authorization. To resolve this issue, you should ensure that there are no multiple SPF records for your domain, check for syntax errors in the existing record, and limit the number of DNS lookups to comply with the SPF specification, which means using efficient mechanisms and avoiding unnecessary complexity.
DMARC TempErrors refer to temporary authentication issues related to email standards such as DKIM and SPF, which can lead to failures in DMARC validation. These errors can result in sporadic email delivery problems, particularly when using Microsoft servers, and addressing them may involve utilizing monitoring services like dmarcian.com for insights into performance metrics and error diagnostics.
Your wait is over as we’re back with cybersecurity’s latest this week! We’ll discuss about a data breach impacting policyholders of a significant insurance organization, a notorious malware spam host resurfacing under a new provider, a new scam targeting US executives using deceptive postal mail; experts recently uncovered a new botnet that is infecting thousands and a concerning discovery of sensitive API keys within AI training datasets. Let’s not wait further and dive in!
A DKIM selector is a string included in the DKIM signature of an email, which helps the recipient’s mail server locate the corresponding public key stored in DNS records for verification purposes. It is essential for ensuring that emails sent from your domain can be properly authenticated, thereby enhancing your email security and integrity.
Migrating from one Office 365 tenant to another can feel a bit like planning a big move: there’s excitement for new beginnings, but also a mountain of details to manage! Whether you’re merging companies, reorganizing, or simply upgrading, a smooth transition is key to keeping everything running without a hitch. With the right strategies and tools in your corner, you can make the process simpler and less stressful.