Why “Low-Volume” Spoofing Is Still a Serious Risk

August 20, 2025

Low spoofing volume doesn’t reduce risk, especially when attacks are targeted at employees or trusted internal recipients.

Why “Low-Volume” Spoofing Is Still a Serious Risk

We recently had a client facing a minor volume of spoofing emails being distributed from their domain. To address the issue, we recorded a detailed video explaining the problem, outlining the potential consequences for their company, and demonstrating what such spoofing emails could look like using an example from another case.

Their response was:"With such a small number of phishing emails compared to others, it's not a top priority for us right now".When we asked, "What if these emails are highly targeted, aiming to phish your employees?" we received no reply.This kind of response raises many concerns and highlights the challenges in creating a safer email environment for everyone.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.