
What is “Header From” spoofing?
"Header From" spoofing is a common email impersonation tactic where a malicious actor forges the visible "From" address of an email to appear as a legitimate sender.
John is a content writer at 101domain with a specialization in Domain-Based Enterprise Technology and Cybersecurity.
"Header From" spoofing is a common email impersonation tactic where a malicious actor forges the visible "From" address of an email to appear as a legitimate sender.
The Sender Policy Framework (SPF) is a crucial email authentication protocol that helps protect your domain from spoofing and phishing attacks. However, SPF has a significant limitation known as the "lookup limit," which can impact your email deliverability and business operations if not managed properly.
At 101domain, we offer both managed and unmanaged DMARC solutions to cater to varied needs. But how do you decide which option is right for your business? Let's explore the differences between managed and unmanaged DMARC services to help you make an informed decision.
In the email-driven business world of today, Business Email Compromise (BEC) attacks are a formidable threat to enterprises worldwide. Let's take a look into three notable cases of BEC attacks and how you might learn from them.
In this short guide, we’ll touch on a few actionable ways to stay out of spam: quality email lists, SPF, and more.
SSL/TLS certificates are critical for safeguarding sensitive information transmitted over the internet. But what exactly are these certificates, and why should businesses care?
Among the many cybersecurity threats businesses face, Distributed Denial of Service (DDoS) attacks stand out as particularly disruptive. This introductory guide aims to help you understand what is a DDoS attack, how they operate, and the steps you can take to assess your vulnerability in order to mitigate potential threats.
Implementing DMARC is essential for protecting your brand and enhancing email deliverability. But which service should you choose?
SSL/TLS certificate monitoring has become more important than ever. Here's what to look out for when choosing a CM service.
While it might seem that only large enterprises would require such technology, Attack Surface Monitoring is, in fact, vital for businesses of every size.