Cybersecurity

Protecting systems, networks, and data from digital threats.

Posts for this tag
All posts
Backscatter Injection Attacks Exploiting Legitimate Infrastructure

Attackers use backscatter emails to bypass filters, harming servers and delivering phishing content.

Backscatter Injection Attacks Exploiting Legitimate Infrastructure
The Risks of Abruptly Enforcing DMARC p=reject in Organizations

Sudden DMARC enforcement can disrupt workflows, block emails, and impact organizational operations significantly.

The Risks of Abruptly Enforcing DMARC p=reject in Organizations
How a Fake Bank Transfer Email Nearly Fooled Me

Spoofed emails can mimic trusted senders, highlighting risks in elementary school communications.

How a Fake Bank Transfer Email Nearly Fooled Me
Microsoft 365 Groups Bypass DMARC, Exposing Organizations to Spoofing

Microsoft 365 groups can deliver spoofed emails despite failing SPF, DKIM, and enforced DMARC policies.

Microsoft 365 Groups Bypass DMARC, Exposing Organizations to Spoofing
Why Subdomain DMARC Policies Are Often Unnecessary

Proper DMARC enforcement on the root domain protects non-existent subdomains without needing separate policies.

Why Subdomain DMARC Policies Are Often Unnecessary
Why Regular Password Changes Still Matter in Real Cybersecurity

Even with MFA, forced password resets help contain breaches and limit ongoing attacker access.

Why Regular Password Changes Still Matter in Real Cybersecurity
Why Reusing Passwords Is Dangerous: The JustDropped Example

Reusing passwords puts accounts at risk, as some platforms store and email credentials in plaintext.

Why Reusing Passwords Is Dangerous: The JustDropped Example