Saturday , May 10 2025
Google yahoo

Google’s New Email Requirements For 2024
February 1, 2024: A Date All Email Senders Should Care About

If your organization sends a large number of emails to Google and Yahoo accounts, there’s an important date to remember: February 1st. On this day, it is important to be aware if you are sending more than 5000 emails daily to Google and Yahoo mailboxes.

So, What Is the Issue?

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

From now on, any email domain sending over 5000 emails a day must meet specific email authentication standards. If not, emails may be rejected. Google and Yahoo are asking for DMARC compliance to prevent scammers from sending malicious emails. It’s important for organizations to address email bounce backs and improve email authentication to protect employees, customers, and partners.

How Do You Become Compliant?

Email authentication helps detect fake email messages. Techniques like DKIM and SPF are examples of email authentication. Being DMARC compliant means publishing a DMARC policy for all your domains and ensuring that your sending sources are correctly authenticated and aligned. DMARC checks if the message matches the sending domain specified by SPF or DKIM. This is called alignment.

DMARC is a policy that shows if messages are verified with SPF and/or DKIM. It also informs the mail gateway how to handle messages that fail both methods, for example, by marking them as junk or rejecting them.
DMARC helps receivers handle failed messages and reduces the risk of users receiving fraudulent and harmful messages. It allows email receivers to report back to senders about messages that pass or fail DMARC evaluation, helping them identify unauthorized usage of their domains.

Work with your IT team and third-party senders to authenticate your email using SPF and DKIM. Make sure to have a DMARC record with a policy of “none”. Follow additional steps recommended by Google and Yahoo, such as having valid forward and reverse DNS for your sending servers, securing connections with TLS 1.2 or later, maintaining low complaint rates, and ensuring that your marketing platform supports easy unsubscribe options.

Email authentication and DMARC compliance may seem complicated, but with tools like Red Sift’s domain protection service, the process becomes simpler. Red Sift OnDMARC also offers AI capabilities to speed up achieving DMARC compliance compared to other platforms.

When working on this project, it is crucial to be careful. For instance, if you fail to configure authorized email senders, their emails may be accidentally blocked. To avoid such problems, it is important to follow a well-thought-out project plan and use a reliable platform.

What Are the Benefits of These Changes?

Google and Yahoo’s new requirements will encourage more organizations to become DMARC compliant, which will reduce spam and prevent domain impersonation attacks. Microsoft is also recommending that its customers follow the guidance of Google and Yahoo.

Check Also

Passwordless

Microsoft New Accounts Go Passwordless By Default

Microsoft is focusing on eliminating password-based authentication, promoting passwordless sign-in and sign-up methods instead. For …

Leave a Reply

Your email address will not be published. Required fields are marked *