Tuesday , June 24 2025
Google yahoo

Google’s New Email Requirements For 2024
February 1, 2024: A Date All Email Senders Should Care About

If your organization sends a large number of emails to Google and Yahoo accounts, there’s an important date to remember: February 1st. On this day, it is important to be aware if you are sending more than 5000 emails daily to Google and Yahoo mailboxes.

So, What Is the Issue?

WhatsApp banned on all US House of Representatives devices

The U.S. House of Representatives has banned congressional staff from using WhatsApp on government devices due to security concerns, as...
Read More
WhatsApp banned on all US House of Representatives devices

Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

Kaspersky found a new mobile malware dubbed SparkKitty in Google Play and Apple App Store apps, targeting Android and iOS....
Read More
Kaspersky found “SparkKitty” Malware on Google Play, Apple App Store

OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

OWASP has released its AI Testing Guide, a framework to help organizations find and fix vulnerabilities specific to AI systems....
Read More
OWASP AI Testing Guide Launched to Uncover Vulns in AI Systems

Axentec Launches Bangladesh’s First Locally Hosted Tier-4 Cloud Platform

In a major milestone for the country’s digital infrastructure, Axentec PLC has officially launched Axentec Cloud, Bangladesh’s first Tier-4 cloud...
Read More
Axentec Launches Bangladesh’s First Locally Hosted Tier-4 Cloud Platform

Hackers Bypass Gmail MFA With App-Specific Password Reuse

A hacking group reportedly linked to Russian government has been discovered using a new phishing method that bypasses two-factor authentication...
Read More
Hackers Bypass Gmail MFA With App-Specific Password Reuse

Russia detects first SuperCard malware attacks via NFC

Russian cybersecurity experts discovered the first local data theft attacks using a modified version of legitimate near field communication (NFC)...
Read More
Russia detects first SuperCard malware attacks via NFC

Income Property Investments exposes 170,000+ Individuals record

Cybersecurity researcher Jeremiah Fowler discovered an unsecured database with 170,360 records belonging to a real estate company. It contained personal...
Read More
Income Property Investments exposes 170,000+ Individuals record

ALERT (CVE: 2023-28771)
Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

GreyNoise found attempts to exploit CVE-2023-28771, a vulnerability in Zyxel's IKE affecting UDP port 500. The attack centers around CVE-2023-28771,...
Read More
ALERT (CVE: 2023-28771)  Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

CISA Flags Active Exploits in Apple iOS and TP-Link Routers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included two high-risk vulnerabilities in its Known Exploited Vulnerabilities (KEV)...
Read More
CISA Flags Active Exploits in Apple iOS and TP-Link Routers

10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

SafetyDetectives’ Cybersecurity Team discovered a public post on a clear web forum in which a threat actor claimed to have...
Read More
10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

From now on, any email domain sending over 5000 emails a day must meet specific email authentication standards. If not, emails may be rejected. Google and Yahoo are asking for DMARC compliance to prevent scammers from sending malicious emails. It’s important for organizations to address email bounce backs and improve email authentication to protect employees, customers, and partners.

How Do You Become Compliant?

Email authentication helps detect fake email messages. Techniques like DKIM and SPF are examples of email authentication. Being DMARC compliant means publishing a DMARC policy for all your domains and ensuring that your sending sources are correctly authenticated and aligned. DMARC checks if the message matches the sending domain specified by SPF or DKIM. This is called alignment.

DMARC is a policy that shows if messages are verified with SPF and/or DKIM. It also informs the mail gateway how to handle messages that fail both methods, for example, by marking them as junk or rejecting them.
DMARC helps receivers handle failed messages and reduces the risk of users receiving fraudulent and harmful messages. It allows email receivers to report back to senders about messages that pass or fail DMARC evaluation, helping them identify unauthorized usage of their domains.

Work with your IT team and third-party senders to authenticate your email using SPF and DKIM. Make sure to have a DMARC record with a policy of “none”. Follow additional steps recommended by Google and Yahoo, such as having valid forward and reverse DNS for your sending servers, securing connections with TLS 1.2 or later, maintaining low complaint rates, and ensuring that your marketing platform supports easy unsubscribe options.

Email authentication and DMARC compliance may seem complicated, but with tools like Red Sift’s domain protection service, the process becomes simpler. Red Sift OnDMARC also offers AI capabilities to speed up achieving DMARC compliance compared to other platforms.

When working on this project, it is crucial to be careful. For instance, if you fail to configure authorized email senders, their emails may be accidentally blocked. To avoid such problems, it is important to follow a well-thought-out project plan and use a reliable platform.

What Are the Benefits of These Changes?

Google and Yahoo’s new requirements will encourage more organizations to become DMARC compliant, which will reduce spam and prevent domain impersonation attacks. Microsoft is also recommending that its customers follow the guidance of Google and Yahoo.

Check Also

AI Vulnerability

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Action

Aim Labs discovered a zero-click AI vulnerability named “EchoLeak” in Microsoft 365 Copilot and reported …

Leave a Reply

Your email address will not be published. Required fields are marked *