Podcasts about dkim

Email authentication method designed to detect email spoofing

  • 158PODCASTS
  • 210EPISODES
  • 35mAVG DURATION
  • 1WEEKLY EPISODE
  • Sep 10, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about dkim

Latest podcast episodes about dkim

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
מה עדיף בהרשמה לדיוור? חיכוך גבוה או חיכוך נמוך? שיקולים בעד ונגד.

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Sep 10, 2025 10:36


במשך השנים "התחנכנו" על כך שככל שנבקש פחות פרטים ונקל על תהליך ההרשמה, נגדיל את רשימת התפוצה. מצד אחד, הרשמה נטולת חיכוך (friction) יכולה להגדיל את שיעורי ההמרה ואולי גם לשפר את חוויית המשתמש. בדרך כלל, זו הגישה שרוב המותגים נוקטים בה: בקשה של כתובת אימייל בלבד, או לכל היותר שם וכתובת אימייל. פעמים רבות כדי למקסם את כמות ההרשמות, אפילו נשים פופ-אפים באתר.ואמנם ככל שנבקש פחות פרטים (כלומר נקטין את החיכוך) נקבל יותר הרשמות ונגדיל את כמות הנרשמים, אבל יתכן שזה יבוא על חשבון איכות הנרשמים ורמת המעורבות שלהם עליה נשלם בעתיד באתגרים הקשורים ל-deliverability ובכל הקשור ב-"Sunset Policy". לאחרונה נשמעים קולות אחרים סביב השאלה האם כדאי במקרים מסוימים דווקא להגביר את החיכוך בתהליכי הרשמה לדיוור. כלומר להפוך את ההרשמה לרשימות דיוור למעט יותר מורכבת על ידי הוספת חיכוך בשלב ההרשמה וגם בשלבים הבאים - לאורך נקודות המגע הראשוניות במסע הלקוח. בצד האחד יש הטוענים כי הפחתת חיכוך, כלומר, צמצום שלבים או פישוט הטפסים משפרת את חוויית המשתמש ומגדילה את שיעורי ההמרה. לעומתם, יש הסבורים כי פשטות יתר עלולה לפגוע באיכות הלידים ורמת המעורבות שלהם בעתיד.בואו ונסקור את שתי האפשרויות, ומה היתרונות והחסרונות של כל אחד מהם.----CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
שוב הגיע לספאם?? פתרון בעיות עבירוּת אימייל באתרי וורדפרס

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Sep 3, 2025 14:08


איך לפתור בעיות עבירות אימייל באתרי וורדפרס?ניהול אתר וורדפרס, גם אם מדובר באתר הפשוט ביותר, כולל צורך בשליחת אימיילים. לדוגמא שליחת אימייל לפתיחת משתמש חדש והסיסמה שלו, הודעות שהאתר שולח אל מנהלי האתר לגבי שגיאות ואם מדובר באתר קצת יותר מורכב, שזה בדרך כלל המצב, שליחת אימיילים שונים כגון אישורי הרשמה, איפוס סיסמה, התראות למנהל האתר וללקוחות הקצה על רכישות בחנות WooCommerce, מילוי טפסי ״צור קשר״ ועוד. בעיות עבירוּת אימיילים (Email Deliverability) מתרחשות כאשר אימיילים הנשלחים מהאתר אינם מגיעים לתיבת ה-Inbox של הנמענים אלא אל הספאם, או שאינם נמסרים כלל (נדחים). בפרק זה זה אסקור מדוע בעיות כאלה קורות וכיצד לפתור אותן. ---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CISSP Cyber Training Podcast - CISSP Training Program
CCT 275: CISSP Rapid Review (Domain 4) - Part 2

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Aug 28, 2025 32:37 Transcription Available


Send us a textCheck us out at:  https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouvThe digital world has opened up unprecedented opportunities for scammers, and seniors have become prime targets. In this alarming and informative episode, we dive deep into the FBI's recent warning about AI-driven "Phantom Hacker" scams that have already stolen over a billion dollars from American seniors through sophisticated three-stage attacks.What makes these scams particularly devastating is the deployment of AI voice cloning technology. With just a small sample of someone's speech, scammers can create perfect voice replicas that sound exactly like trusted family members or financial advisors. This technology has advanced to the point where distinguishing between real and AI-generated voices is nearly impossible for most people. As cybersecurity professionals, we have a responsibility to protect vulnerable populations through education and clear verification protocols.The episode transitions into a comprehensive review of CISSP Domain 4, covering essential communication and network security concepts. We explore voice communications security for both traditional telephone networks and modern VoIP systems, email security protocols including SPF, DKIM, and DMARC, and remote access considerations with VPNs. The discussion covers critical decisions between split and full tunneling, network address translation complexities, and third-party risk management through formal agreements and vendor assessments.Whether you're preparing for the CISSP exam or looking to strengthen your organization's communication security posture, this episode provides actionable insights on protecting against today's most sophisticated threats. The convergence of AI technology with traditional social engineering tactics demands a new approach to security awareness and technical controls—one that acknowledges voice is no longer a reliable authentication factor on its own.Ready to continue your CISSP journey? Visit CISSPCyberTraining.com for free resources including practice questions, rapid review videos, and a comprehensive study plan designed to help you pass the exam on your first attempt.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
הדיוור החשוב הזה נופל בין הכיסאות...

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Aug 27, 2025 9:12


פרק זה עוסק באבחנה בין שלושה סוגים של אימיילים שעסקים שולחים: שיווקיים, טרנזקציוניים ותפעוליים. אימיילים שיווקיים מיועדים לקידום מכירות ונשלחים לרשימות תפוצה גדולות, לרוב בלוח זמנים קבוע, ודורשים הסכמה ואפשרות הסרה. אימיילים טרנזקציוניים הם אישיים, נשלחים בתגובה לפעולה ספציפית של המשתמש (כגון אישור הזמנה או איפוס סיסמה), ומטרתם לספק מידע חיוני בזמן אמת. הם אינם שיווקיים במהותם וזוכים לשיעורי מעורבות גבוהים במיוחד.אימיילים תפעוליים הם קטגוריה שנמצאת בין שני הסוגים הללו. הם אינם נובעים מפעולה מיידית ואישית של המשתמש כמו טרנזקציוניים, וגם אינם נועדו למכירה כמו שיווקיים. מטרתם היא לספק מידע חשוב ושוטף על השירות או החשבון של הלקוח, כמו דוחות תקופתיים, חשבונות חודשיים, התראות על סיום תהליך במערכת, הודעות על שינויים בתנאי שירות, או עדכוני אבטחה. למרות חשיבותם לשמירה על אמון הלקוח וחווית השירות, לעיתים קרובות הם "נופלים בין הכיסאות" במערכות הדיוור, מכיוון שאינם מוגדרים בצורה מובהקת כמו השיווקיים והטרנזקציוניים.הפרדה בין סוגי האימיילים, לרוב על ידי שימוש בתתי-דומיינים נפרדים לכל סוג, חיונית לאופטימיזציה של העבירוּת (Deliverability) שלהם. אימיילים טרנזקציוניים ותפעוליים, בעלי שיעורי מעורבות גבוהים יותר, בונים מוניטין חיובי מול ספקיות האימייל, ולכן שמירתם על דומיין נפרד מהאימיילים השיווקיים (הנושאים סיכון גבוה יותר לתלונות ספאם או שיעורי פתיחה נמוכים) מבטיחה שהודעות קריטיות אלו יגיעו לתיבת הדואר הנכנס. המאמר מדגיש כי בעוד שאימיילים שיווקיים כפופים לרגולציה מחמירה (כמו דרישת הסכמה ואפשרות הסרה), אימיילים טרנזקציוניים ותפעוליים פטורים בדרך כלל מדרישות אלו, כל עוד הם נשארים אינפורמטיביים ולא מכילים תוכן שיווקי.---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ואימייל מרקטינג, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

FLASH DIARIO de El Siglo 21 es Hoy
Ataque de phishing IA en gmail

FLASH DIARIO de El Siglo 21 es Hoy

Play Episode Listen Later Aug 25, 2025 8:25


Las nuevas estafas en Gmail usan inyección de instrucciones para engañar a usuarios y hasta a defensas con inteligencia artificial  Por Félix Riaño @LocutorCo  Un ataque de phishing está usando inteligencia artificial para burlar las defensas de Gmail y robar contraseñas. La campaña incluye correos falsos de soporte técnico, llamadas telefónicas y hasta páginas que imitan al login de Google. Expertos en ciberseguridad advierten que miles de millones de cuentas están en riesgo. Google ha confirmado que la mayoría de usuarios va a tener que cambiar sus contraseñas y activar nuevos métodos de autenticación.  El engaño digital nunca se queda quieto. Ahora los atacantes están probando un nuevo truco: no se conforman con engañar a los humanos, también quieren manipular a las máquinas que nos protegen. Un correo electrónico que aparenta ser una alerta de expiración de contraseña llega a la bandeja de entrada, acompañado de un enlace disfrazado de legítimo. Hasta aquí parece un phishing clásico. Pero lo que no se ve a simple vista es que el código del mensaje contiene instrucciones ocultas dirigidas a modelos de inteligencia artificial, como los que usan muchas empresas de seguridad para clasificar correos. El resultado puede ser que la propia IA se distraiga y no bloquee la amenaza. Y mientras tanto, ¿cuántos usuarios siguen creyendo que Google les va a enviar un mensaje pidiendo su clave?Los hackers ahora atacan a las personas y a la inteligencia artificial  Los investigadores explican que este ataque comenzó con correos que parecían muy convincentes. El asunto decía “Notificación de expiración de inicio de sesión” con hora y fecha precisas. El cuerpo del mensaje aseguraba que la contraseña estaba a punto de expirar, presionando al usuario a hacer clic en un enlace. El truco clásico de generar urgencia. Lo interesante es que los correos pasaron filtros básicos: superaron pruebas SPF y DKIM, que sirven para verificar la autenticidad, y solo fallaron en DMARC. Esto permitió que aterrizaran en bandejas de entrada reales. Al seguir el enlace, la víctima encontraba primero una página con captcha, diseñada para impedir que los escáneres automáticos llegaran al verdadero destino: una página idéntica al login de Gmail, con código oculto para robar credenciales.  Lo más alarmante es que los atacantes escondieron instrucciones tipo “prompt” en el código del correo. Estos mensajes secretos están redactados en el estilo que usamos con sistemas como ChatGPT o Gemini. Así, si una herramienta de seguridad basada en inteligencia artificial analizaba el correo, podía quedar atrapada en un bucle de razonamiento o distraída generando explicaciones irrelevantes. En otras palabras, los hackers encontraron la manera de hackear a la propia inteligencia artificial. El ataque no se limita a engañar a las personas, también busca engañar a los filtros automáticos. A esto se suma que muchos usuarios siguen sin activar medidas básicas como la autenticación de dos factores o los passkeys, que reemplazan a las contraseñas. Y si a eso agregamos que se filtraron datos de hasta 2.500 millones de cuentas en un ataque previo, la combinación es peligrosa.  Google ha reaccionado confirmando que la mayoría de usuarios de Gmail va a tener que cambiar su contraseña. Recomienda hacerlo de inmediato y no usar la misma clave en diferentes servicios. La empresa también insiste en activar passkeys, que permiten ingresar sin contraseña y reducen la posibilidad de robo. Expertos recomiendan usar aplicaciones de autenticación en lugar de códigos SMS, que son más fáciles de interceptar. Además, recuerdan una regla de oro: Google nunca va a llamar por teléfono para pedirte tu clave, ni a enviarte un mensaje con enlaces directos para iniciar sesión. Si ves un mensaje sospechoso, verifica la actividad en la página oficial de seguridad de tu cuenta. Los grupos de hackers como ShinyHunters ya han usado tácticas similares para robar datos de millones de usuarios en otras plataformas, así que no se trata de un caso aislado.  Este tipo de ataques mezcla varias técnicas de engaño. Hay “vishing”, que son llamadas telefónicas en las que un supuesto soporte técnico pide códigos. Hay correos falsos que imitan el estilo de las alertas de seguridad reales de Google. Y ahora, se suma la inyección de instrucciones para confundir a los sistemas de inteligencia artificial. Según la Comisión Federal de Comercio de Estados Unidos, también se han visto casos similares con Amazon y PayPal. En estos, los usuarios reciben mensajes falsos de reembolso o de fallos en la entrega de productos. La táctica es siempre la misma: generar miedo o urgencia, y convencer a la persona de entregar sus datos sin pensar demasiado. Lo novedoso aquí es que también intentan manipular la tecnología que debería detenerlos. Los expertos en seguridad advierten que, así como los filtros se vuelven más inteligentes, los atacantes también se actualizan.  Los ataques de phishing en Gmail evolucionan. Ahora mezclan engaños para personas y trucos contra la inteligencia artificial. Cambia tu contraseña, activa passkeys y revisa tus alertas solo en la página oficial de Google. Y no olvides seguir Flash Diario en Spotify para mantenerte protegido con la mejor información.  Nuevo phishing en Gmail engaña a usuarios y hasta a la inteligencia artificial. Google exige cambiar contraseñas y activar passkeys.

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
כש"המדינה" שולחת לך פישינג, זה הרבה יותר מלחיץ...

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Aug 20, 2025 16:04


אם זה הולך כמו ברווז, נראה כמו ברווז, אז אולי זה בכלל... פישינג?

Lunch With Norm - The Amazon FBA & eCommerce Podcast
Your Emails Are Going Straight to Spam (Let's Fix That) | Daniel Shnaider

Lunch With Norm - The Amazon FBA & eCommerce Podcast

Play Episode Listen Later Aug 18, 2025 51:00


Email isn't dead but your inbox deliverability might be. Use code:WEBINAR25 for 25% off on all the Warmy subscriptions https://www.warmy.io/ In this must-watch episode, we dive into the real reasons why your cold emails, newsletters, and campaigns aren't reaching your audience and it's not your subject line. Daniel Shnaider, co-founder of Warmy.io and seasoned SaaS entrepreneur, reveals the hidden traps most brands fall into from domain reputation to DMARC, SPF, and DKIM settings and explains how AI-powered email warm-up strategies can revive your campaigns.

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
יש כרטיס מועדון? - על האבולוציה של מועדוני לקוחות

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Aug 13, 2025 15:06


יש כרטיס מועדון? על האבולוציה של מועדוני לקוחותאני בעולם הדיוור, עוד כשהיו עושים אותו בדואר.מועדוני לקוחות כבר הפכו לסוג של קלישאה. מי יכול לזכור לכמה מועדונים הוא הצטרף ומה מיוחד במועדון זה או אחר?לצד בלי סוף "כלום מאותו הדבר", יש גם דוגמאות טובות למועדוני לקוחות.ב-1993 או אולי זה היה ב-1994 הייתי בהרצאה של אייזיק ולדמן, שהיה אז מנכ"ל איי-בי דאטה, שהייתה החברה הראשונה בארץ להקמה וניהול של מועדוני לקוחות. הייתה לו הרצאה מרתקת על מועדוני לקוחות. לימים יצא לנו לעבוד יחד והפכנו להיות חברים. הוא סיפר בהרצאה: שכשהיינו ילדים, אכלנו לארוחת הבוקר ביצה. זו הייתה יכולה להיות חביתה, ביצה עין או מקושקשת, אבל זו הייתה ביצה. לא היתה בעיית נאמנות. זה מה שאכלנו. מה אוכלים היום הילדים? קורנפלקס כזה או אחר. יש בלי סוף סוגים ומותגים ומי זוכה? מי נאמן למותג כזה או אחר? כל פעם יש שגעון למותג זה או אחר ואין נאמנות למותג ספציפי.מועדוני לקוחות נולדו מתוך כוונה לשמר נאמנות למותג.אם נסתכל על הפירמידה ההפוכה של משפך שיווקי קלאסי, המשולש הקטן בתחתית המשפך הוא גרעין הלקוחות המרוצים, עד כדי כך שהם ממליצים. ----CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
למחוק או לא למחוק - זו השאלה (שחוזרת על עצמה)

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Aug 6, 2025 15:33


פודקאסט עם Dela Quist באנגליתפודקאסט עם Dela Quist בעבריתפודקאט באנגלית עם Jakub Olexa על תופעת האינטראקציות הלא אנושיות (פתיחות והקלקלות שווא)---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

CRM.BUZZ הוא בלוג ופודקאסט בעברית החוגג היום 300 פרקים העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
DMARC והטעויות - על טעויות נפוצות בהגדרת DMARC, למה זה חשוב וכיצד להימנע

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Jul 23, 2025 19:34


DMARC והטעויותעל טעויות נפוצות בהגדרות DMARC, למה זה חשוב וכיצד להימנע מהן.אחת מהדרישות המנדטוריות של ספקיות האימייל הגדולות שהוצגו ב2024 היתה להגדיר רשומת DMARC.התחלתי פרויקט מחקר עצמאי שיבדוק את רוב הדומיינים הרשומים על ידי עסקים בישראל. לפי איגוד האינטרנט בישראל ישנם כ-287 אלף אתרים בסיומת IL. בפרויקט אבחן הביטים שונים הקשורים בדיוור. בין השאר אתמקד ברשומות DMARC בדומיינים הללו. כשלב ראשון בפרויקט לקחתי את 1000 האתרים הפופולריים בישראל - לא כולם ישראלים - ובדקתי את מצב רשומת DMARC שלהם. הממצאים מפתיעים. בהמשך הפודקאסט אציג אותם...אבל קודם כל בואו נדבר על הטעויות הנפוצות הקשורות ב-DMARC ואולי עוד קודם לכן – מה זה בכלל DMARC. ---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
חדש ב-Gmail: מרכז לניהול המנויים שמאפשר הסרה מדיוורים במקום מרכזי אחד

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Jul 16, 2025 11:10


בחודש יולי 2025 גוגל התחילה בהשקה של פיצ'ר חדש בשם "Manage Subscriptions" בתוך Gmail, המיועד לעזור למשתמשים להשתלט על עומס הודעות הדיוור שהם מקבלים ולנהל את הניוזלטרים והדיוורים השיווקיים שהם רשומים אליהם במקום מרוכז אחד. כך Gmail כותבת: קל מאוד להרגיש מוצף מכמות עצומה של אימיילים מרשימות תפוצה שמעמיסים על תיבת האימייל שלכם: התראות על מבצעים יומיים שנראות כמו ספאם, ניוזלטרים שבועיים מבלוגים שכבר אינך קורא, ואימיילים שיווקיים מחנויות שלא קנית בהן כבר שנים. כל אלה יכולים להצטבר במהירות. עם הפיצ'ר החדש של Gmail בשם "ניהול מנויים" תוכלו לצפות ולנהל את האימיילים שהנכם מנויים עליהם במקום אחד, ולבטל הרשמה בקלות מכל מה שכבר לא רלוונטי עבורכם.עוד היא כותבת- Gmail תמיד פעלה כדי לשמור על תיבת אימייל נקייה מאימיילים לא רצויים. הדרישות שלנו מממדוורים (הוצגו ב-2024) וכלים שמערכות דיוור הוסיפו כמו "ביטול הרשמה בקליק אחד" (easy unsubscription) המעניקים שליטה גדולה עוד יותר ולבחור אילו אימיילים אתם רוצים להמשיך לקבל, ולהפסיק לקבל את האימיילים שאתם לא רוצים יותר לקבל. לצד המאמצים שלנו לשמור על תיבות אימייל בטוחות, אנו גם שמים דגש על מתן שליטה רחבה יותר למשתמשים על ההודעות שהם רוצים לקבל. כיום Gmail חוסם יותר מ-99.9% מהספאם, ניסיונות פישינג ונוזקות, ולאחרונה השקנו מנגנוני הגנה חדשים מבוססי בינה מלאכותית שהפחיתו ב-35% את כמות האימיילים שכוללים ניסיונות הונאה (פישינג).מהו מרכז המנויים החדש? האזינו לפרק.---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
גוגל שיבשה לנו את האינטרנט. השאלה היא איך לתקן ומי יתקן?

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Jul 9, 2025 13:40


נתקלתי לאחרונה באתר כלשהו שהעתיק תוכן מהבלוג שלי. זו אמנם לא העתקה מילה במילה אבל ברור לי שהמקור הוא האתר שלי. זה מרגיז אבל זה בדיוק מה שקורה כעת באינטרנט מודל 2025 ומי שמעתיק הוא לא איזה אתר קיקיוני שברוב חוצפתו לוקח תוכן שירקתי דם כדי ליצור ומפרסם אותו בניסוח שונה ללא מתן קרדיט וללא קבלת רשות וללא מתן כל תמורה. מי שעושים את זה כיום מהמקפצה אלו זחלני ה-AI של גוגל והחברות עם עוזרי ה-AI.לא מזמן כתבתי מאמר נרחב שמתאר את הדרמה הגדולה סביב ההכרזה האחרונה של גוגל (05/25) שמשמעותה היא שגוגל מחסלת את האינטרנט כפי שהכרנו אותו. שההכרזה האחרונה של גוגל מבהירה את האמת המרה: גוגל בונה חומה בֶּינה לבין אתרי קניות ואתרי תוכן והגולשים יוכלו לקבל את כל התשובות ולהשלים את כל הפעולות בלי לצאת מהגן הסגור של גוגל. בצורה דומה עוזרי AI למיניהם עושים את אותו דבר. לוקחים תוכן מאתרים, חלקו מוגן בזכויות יוצרים, מאמנים את המודלים שלהם ואח"כ נותנים תשובות על בסיסו מבלי שיוצרי התוכן המקורי נהנים מכך.התופעה הזו של "אפס הקלקות" מגוגל וממנועי AI אחרים היא בעיה גדולה. ישנם לדעתי 3 פתרונות לבעיה הזו.---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
נקודות מבט שונות על ניקיון רשימות תפוצה לדיוור

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Jul 2, 2025 19:31


ניתן להתייחס לנושא ניקיון רשימות התפוצה (list hygiene) מזוויות שונות ולעיתים אפילו קיים בלבול באופן השימוש במונח הזה.זווית ראיה אחת של ניקוי רשימות תפוצה עוסקת בעיקר בניקיון הטכני של רשימות התפוצה, הזווית השנייה בנמענים שלא נראים פעילים במערכת הדיוור, איך לזהות אותם ומה לעשות איתם? למחוק, לא לדוור אליהם או אולי לנסות להעיר אותם בדרכים שונות.---CRM.BUZZ הוא בלוג ופודקאסט בעברית העוסקים באימייל מרקטינג, עבירוּת אימיילים ושיווק.יוצר הפודקאסט והבלוג הוא סלע יפה (Sella Yoffe), מומחה בינ"ל לעבירוּת אימיילים ושיווק באימייל, מסייע למדוורים גלובליים, סטרטאפים, סוכנויות אימייל ומערכות דיוור (ESPs) עם מסירות אימייל, אימות אימייל (SPF, DKIM, DMARC, BIMI), ואסטרטגיית אימייל. קישור אל הבלוג

SEO Podcast Unknown Secrets of Internet Marketing
From Cold Emails to Hot Leads: The Digital Marketing Backbone You Can't Ignore featuring Jay Schwedelson

SEO Podcast Unknown Secrets of Internet Marketing

Play Episode Listen Later Jun 28, 2025 40:06 Transcription Available


Email marketing still converts better than most digital channels, yet many businesses overlook this powerful tool because of misconceptions about its effectiveness or complexity. • Email is definitely not dead – it's been generating millions in revenue for over a decade• Design doesn't matter in email – focus on consistency and authenticity instead• The sweet spot for email frequency is 2-4 times per month• DNS records (SPF, DKIM, DMARC) are now essential for good deliverability• Different platforms serve different needs – MailChimp for beginners, Active Campaign for automation, GoHighLevel for all-in-one• Lead magnets should provide genuine value worth at least a couple hundred dollars• Perfectionism kills results – "good enough to get it out there" is a winning philosophy• Structure emails with curiosity in subject lines, a hook at the beginning, storytelling in the middle, and a clear CTA• The 7-11-4 principle: prospects need 7 hours of content, seeing your message 11 times, across 4 channels• Being "unapologetically authentic" builds stronger connections than polished marketing-----Guest Information: https://www.linkedin.com/in/schwedelson/https://subjectline.com/https://guruconference.com/https://outcomemedia.com/------More from EWR and Matt:Leave a Review if it was content you enjoyed: https://g.page/r/CccGEk37CLosEB0/reviewFree SEO Consultation: https://www.ewrdigital.com/discovery-callOne-on-One Consulting: https://www.ewrdigital.com/digital-strategy-consulting/private-consulting-session—The Unknown Secrets of Internet Marketing podcast is a podcast hosted by Internet marketing expert Matthew Bertram. The show provides insights and advice on digital marketing, SEO, and online business. Topics covered include keyword research, content optimization, link building, local SEO, and more. The show also features interviews with industry leaders and experts who share their experiences and tips. Additionally, Matt shares his own experiences and strategies, as well as his own successes and failures, to help listeners learn from his experiences and apply the same principles to their businesses. The show is designed to help entrepreneurs and business owners become successful online and get the most out of their digital marketing efforts.Find more great episodes here: https://www.internetmarketingsecretspodcast.com/  https://seo-podcast-the-unknown-secrets-of-internet-marketing.buzzsprout.comFollow us on:Facebook: @bestseopodcastInstagram: @thebestseopodcastTiktok: @bestseopodcastLinkedIn: @bestseopodcastPowered by: ewrdigital.comHosts: Matt Bertram Disclaimer: For Educational and Entertainment purposes only.Support the show

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד
האשם תמיד הוא ה-DNS. מהו DNS ואיך הוא משפיע על פעילות האימייל מרקטינג שלך

CRM.Buzz - שיווק, חווית לקוח, טכנולוגיה, דאטה ועוד

Play Episode Listen Later Jun 4, 2025 17:58


האשם הוא תמיד ה-DNSמהו DNS ולמה הוא חשוב כל כך לפעילות אימייל מרקטינג?מערכת שמות המתחם, ראשי תיבות Domain Name System (או DNS) היא מרכיב קריטי לתפקוד כל תשתית אינטרנט. לעיתים קרובות אולי בגלל היותו מרכיב טכני, ה-DNS ואופן ניהולו אינם מקבלים את תשומת הלב הראויה מצד מדוורים או בעלי אתרים.במסגרת תהליכי ליווי לקוחות אני נתקל בהמון בעיות סביב ה-DNS שבהקשר של אימייל מרקטינג ותפעול תקין של אימייל בכלל, ל- DNS תפקיד קריטי. הוא שומר בתוכו את כל ההגדרות הדרושות לזיהוי, ניתוב, אימות ואבטחת תעבורת האימיילים. כאשר אימייל נשלח, שרתי הדואר בצד המקבל פונים אל ה-DNS של הדומיין השולח ובודקים רשומות SPF, DKIM ו DMARC -כדי לבצע בדיקות ולהחליט אם לקבל את ההודעה, לסווג אותה כספאם, לדחות אותה בהתאם למדיניות DMARC ופרמטרים אחרים.בכל אימייל שנשלח ממערכת הדיוור או כל מערכת מדוורת בשם הדומיין, שרתי הדואר של הצד המקבל יבצעו פניות אל ה-DNS של הדומיין ויבדקו את הרשומות לאימות הדומיין SPF, DKIM, DMARC.

CiberClick
T14x16 - Correo Blindado

CiberClick

Play Episode Listen Later May 20, 2025 56:00


Damos un repaso a los conceptos de SFP, DKIM y DMARC para utilizar el correo electrónico de forma segura. Adems nos acompañan desde CYBERTIX Lorenzo Diaz de Apodaca, CEO y Eduardo Sáez, responsable de Servicios Gestionados. Con: Ray Mills y Carlos Valerdi. Dirige: Carlos Lillo. Gracias a Cyber gurú, Cybertix, Kaspersky, V-Valley y Cato Networks.

CiberClick
T14x16 - Correo Blindado

CiberClick

Play Episode Listen Later May 20, 2025 56:29


Damos un repaso a los conceptos de SPF, DKIM y DMARC para utilizar el correo electrónico de forma segura. Adems nos acompañan desde CYBERTIX Lorenzo Diaz de Apodaca, CEO y Eduardo Sáez, responsable de Servicios Gestionados. Con: Ray Mills y Carlos Valerdi. Dirige: Carlos Lillo. Gracias a Cyber gurú, Cybertix, Kaspersky, V-Valley y Cato Networks.

The Jerich Show Podcast
Bad actors arrested, phishing with google, Darkula get's an upgrade and more!

The Jerich Show Podcast

Play Episode Listen Later May 9, 2025 15:50


Erich and Javvad summarize this week's cyber soap opera and bring you a tangled web of digital deceit, artificial “intelligence,” and just enough government extradition drama to keep things spicy. From Spain With Wire Fraud: Alleged “Scattered Spider” member Tyler Buchanan thought sunny Spain was a safe hideout—until the long arm of U.S. justice said hola. Extradited for allegedly scamming Caesars and MGM, his toolkit included SIM swapping and social engineering. Welcome to America, Tyler—hope you like federal courtrooms. Phishing with Google's Seal of Approval: Meanwhile, phisherfolk are reusing Google's DKIM signatures like they're leftover lasagna—slapping them onto spoofed emails from no-reply@accounts.google.com and tricking even the most paranoid clickers. The result? Legit-looking credential traps hosted on Google Sites. It's like gourmet phishing, served with a side of irony. Darcula Gets a Brain Upgrade: And if you thought cybercrime required effort, think again. The Darcula phishing kit now uses generative AI to do all the heavy lifting. Bad grammar and clunky templates? Gone. Now, even your cousin Steve with zero hacking skills can impersonate a bank in 100 languages. Thanks, AI. Tune in for a romp through the latest digital deceptions, complete with dark web drama and facepalms galore. Stay sharp—because the hackers definitely are.

Darn IT Podcast
When Google Emails Lie: Phishing Through the Front Door

Darn IT Podcast

Play Episode Listen Later May 8, 2025 7:48


An email from Google. A law enforcement warning. Everything looks legit—until it isn't. In this episode of Darnley's Cyber Cafe, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

Intego Mac Podcast
Episode 393: Reverse Engineering

Intego Mac Podcast

Play Episode Listen Later Apr 24, 2025 30:46


The Better Business Bureau advises Apple to curb its deceptive Apple Intelligence marketing. What is "slopsquatting"? It doesn't sound very appealing, but it is to cyber criminals. And we've got another reason why phishing scammers love Google services. Show Notes: Urgent: macOS Sequoia 15.4.1, iOS 18.4.1 address 2 zero-day vulnerabilities Josh: Here's why you should stay on the very latest Apple OS Technical analysis of CVE-2025-31201 Apple drops ‘available now' from Apple Intelligence page AI-hallucinated code dependencies become new supply chain risk Cookie-Bite attack PoC uses Chrome extension to steal session tokens OpenAI tells judge it would buy Chrome from Google Phishers abuse Google OAuth to spoof Google in DKIM replay attack Whisky development ends on macOS to help Wine flourish Is 2025 the year of Mac gaming? Top 5 reasons to be a Mac gamer Instagram Launches 'Edits' App to Replace CapCut Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 23, 2025 6:18


xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google. https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/ SSL.com E-Mail Validation Bug SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers. https://bugzilla.mozilla.org/show_bug.cgi?id=1961406

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier
Nissan's Tariff Plan, Working Man's Cybertruck, Cybercriminals Mimic Google

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier

Play Episode Listen Later Apr 22, 2025 14:31


Shoot us a Text.Episode #1025: We cover Nissan's plan to hold vehicle prices through early June and increase U.S. production in response to tariffs. Plus we examine Tesla's strategic repositioning of the Cybertruck and how cybercriminals are creating a realistic-looking phishing campaign using Google's own tools.Show Notes with links:Nissan is staying steady on pricing through June 2 and looking to its underused U.S. factories to soften the blow of auto tariffs. The strategy focuses on affordability and domestic production leverage.Nissan has a 3-month supply of tariff-free vehicles and won't raise prices yet.The company plans to boost output at Smyrna, TN and Canton, MS plants, all of which operated at half their capacity in 2024.Rogue production will jump by 54% over the next year, adding 60,000 units, while price cuts of $1K on 2025 Rogue and Pathfinder aim to drive demand.Nissan is incentivizing retailers with its April and May dealer volume bonus program, which pays extra cash to stores that meet sales targets.“We count all the cars [toward the sales target], but we only pay on the U.S.-made cars because we want to give [them a] tailwind,” said Nissan Americas Chair Christian MeunierTesla is quietly shifting the Cybertruck's identity from status symbol to workhorse after early hype faded, trucks stockpiled, and political ties turned divisive. The new approach aims to resonate with a more traditional truck-buying audience.Cybertruck deliveries remain under 50,000; demand has sharply declined with sales dropping 50% in Q1.Tesla updated the product page with rugged, utilitarian imagery, aligning with Ford's F-150 ads.Sales teams report it's harder to sell the truck to actual truck buyers; its novelty isn't enough."They need to advertise durability. It needs to be used and abused, and all of the capabilities that make it a work truck need to be on full display," said Edmunds' Ivan Drury.Cybercriminals are exploiting Google's own “Sites” app to run a phishing campaign that convincingly mimics law enforcement subpoenas and bypasses email authentication safeguards.Emails appear from “no-reply@google.com” and claim law enforcement access to your account.Attackers use Google Sites to create convincing portals that evade DKIM checks.DomainKeys Identified Mail (DKIM) authentication is passed since the emails originate from Google's own infrastructure.Google has acknowledged the issue and is deploying mitigations while encouraging 2FA and passkeys.Join Paul J Daly and Kyle Mountsier every morning for the Automotive State of the Union podcast as they connect the dots across car dealerships, retail trends, emerging tech like AI, and cultural shifts—bringing clarity, speed, and people-first insight to automotive leaders navigating a rapidly changing industry.Get the Daily Push Back email at https://www.asotu.com/ JOIN the conversation on LinkedIn at: https://www.linkedin.com/company/asotu/

Coaching Hive with Dr. Moira Hanna
#240: Don't Derail Your Course: GDPR, Deliverability, & Accessibility Essentials

Coaching Hive with Dr. Moira Hanna

Play Episode Listen Later Apr 22, 2025 18:23


Launching a course? Don't let legal & technical details derail your success! This episode covers GDPR compliance, email deliverability, and accessibility – essential steps to protect your course and your students. Learn how to avoid headaches and build a sustainable, ethical business.Learn how to:Implement GDPR and ethical email etiquette: Obtain consent, provide opt-outs, and be transparent.Improve email deliverability: Authenticate emails, maintain clean lists, and avoid spam triggers.Ensure course accessibility: Provide captions, use proper color contrast, and design for keyboard navigation.Weekly Action Item:Choose one of the following to implement this week:Review your email opt-in process and privacy policy.Check your email authentication settings (DKIM, SPF, DMARC).Get started on Accessibility with the Accessibility Starter Kit at https://digitalcourse.pro/accessibility Show Resources: Check out all podcast episodes and full transcripts (www.digitalcoursecreatorguide.com/podcast)Follow me on Facebook (facebook.com/digitalcoursecreatorguide) and on Instagram (instagram.com/digitalcoursecreatorguide) for daily tips and ideasWork With Dr. Moira:Join Office Hours for support and mentoring to get your digital course done. (https://digitalcourse.pro/Office-Hours)Make sure that your content is accessible with The Accessibility Starter Kit for Online Creators micro course. (https://digitalcourse.pro/accessibility)Join me for our monthly workshop. April is all about creating your digital course outline in 90 minutes. (https://digitalcourse.pro/monthly-workshop)

Cyber Security Headlines
Google OAuth abused, Japan's trading scams, hijacking with Zoom

Cyber Security Headlines

Play Episode Listen Later Apr 22, 2025 7:59


Google OAuth abused in DKIM replay attack Japan warns of sharp rise in unauthorized trading North Koreans hijacking Zoom's Remote Control Huge thanks to our sponsor, Dropzone AI Security threats don't clock out at 5 PM, but your analysts need to sleep sometime. Dropzone AI delivers around-the-clock alert investigations with the same attention to detail at midnight as at noon. Our AI SOC Analyst ensures no more morning backlogs and no more off-hours blind spots. Just reliable, continuous protection that ensures every alert gets the attention it deserves, regardless of when it arrives. See how SOC teams are achieving true 24/7 coverage with our AI SOC Analyst without the staffing challenges at Dropzone.ai.

FLASH DIARIO de El Siglo 21 es Hoy
Hackers se disfrazan de Google

FLASH DIARIO de El Siglo 21 es Hoy

Play Episode Listen Later Apr 22, 2025 7:08


Ataque de phishing usa la infraestructura de Google y engaña a millones con un correo falso que parece legítimoPor Félix Riaño @LocutorCoUn ataque de phishing altamente sofisticado está poniendo en riesgo la información personal de 3.000 millones de usuarios de Gmail.Google ha confirmado un ataque de phishing tan convincente que logró pasar todas sus verificaciones de seguridad, engañando incluso a usuarios expertos. El correo fraudulento simula una alerta oficial sobre una citación judicial y dirige a los usuarios a un portal falso alojado en sites.google.com. La trampa: capturar credenciales y robar el acceso a las cuentas. ¿Cómo es posible que incluso los expertos estén cayendo en este engaño?El mensaje parece legítimo… hasta en los detalles más técnicosNick Johnson, desarrollador y experto en Ethereum, recibió un correo que parecía oficial. Decía que Google había recibido una citación judicial para acceder a su cuenta. El remitente: no-reply@accounts.google.com. Todo parecía normal, incluso el dominio tenía sello de verificación DKIM, una firma digital que certifica la autenticidad del correo. Hasta aquí, todo encajaba. Pero al hacer clic, lo llevó a un sitio clonado, una copia perfecta de la página de inicio de sesión de Google. Todo alojado en sites.google.com, parte de la infraestructura legítima de Google. Así, los delincuentes cibernéticos lograron sortear todas las defensas automáticas del sistema.Este ataque no fue obra de aficionados. Usaron un kit de phishing comprado en foros clandestinos, por menos de 25 dólares. Estos kits permiten crear páginas falsas, copiar sitios web reales y enviar correos con apariencia creíble. Lo más grave: pasaron los filtros de autenticación de Google, incluyendo DKIM, SPF y DMARC. Además, el mensaje se ubicó en la misma conversación de otras alertas reales de seguridad. Por eso, incluso usuarios expertos como Johnson y otros desarrolladores fueron engañados. Si no tienes activada la autenticación en dos pasos o no usas passkeys, tus datos pueden quedar expuestos.Google reconoció la falla y aseguró que ya está desplegando protecciones para cerrar esta puerta de entrada. Además, recomendó a todos los usuarios activar la autenticación multifactor o, mejor aún, usar passkeys. Estas llaves de acceso están vinculadas a un dispositivo físico, por lo que no pueden ser robadas con solo un correo falso. En caso de que un hacker cambie tu contraseña y los métodos de recuperación, Google da un plazo de siete días para intentar recuperar la cuenta con el número o correo de recuperación antiguos, siempre que ya estuvieran registrados.Las técnicas de suplantación avanzaron tanto que incluso Troy Hunt, creador del sitio Have I Been Pwned, fue víctima de un correo similar. Este ataque demuestra cómo los ciberdelincuentes aprovechan subdominios legítimos como sites.google.com y vulnerabilidades antiguas que permiten ejecutar scripts y embebidos en páginas aparentemente confiables. Según NordVPN, más de 85.000 URLs falsas imitaron a Google en 2024. El negocio detrás del phishing también creció: los atacantes compran kits completos que incluyen plantillas de correos, páginas falsas y bases de datos de contactos, todo listo para ejecutar.Evita hacer clic en enlaces de correos sospechosos. Abre siempre las páginas desde el navegador y revisa bien el dominio.Flash Diario en Spotify

Techmeme Ride Home
Mon. 04/21 – Trump Helps Zuck Get A Reprieve In Europe

Techmeme Ride Home

Play Episode Listen Later Apr 21, 2025 16:44


Meta and Apple were about to go to the woodshed in Europe, but it looks like Trump's tariffs have run interference for them. Everyone wants in on stablecoins, example number 23. Beware of phishing emails from Google.com. And are OpenAI's latest models good, bad, or just “jagged”?Sponsors:QualiaLife.com/ride and code RIDELinks:EU Delayed Punishing Apple, Meta Just Before Trade Talks Started (WSJ)Crypto Knocks on the Door of a Banking World That Shut It Out (WSJ)Phishers abuse Google OAuth to spoof Google in DKIM replay attack (Bleeping Computer)Coinbase in hot water over $12 million ‘content coin'—but exec tells haters to lean in (Fortune Crypto)OpenAI's new reasoning AI models hallucinate more (TechCrunch)On Jagged AGI: o3, Gemini 2.5, and everything after (Ethan Mollick)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Cyber Threat Perspective
Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?

The Cyber Threat Perspective

Play Episode Listen Later Apr 11, 2025 28:19


In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to help protect your organization from attacks like Business Email Compromise (BEC).Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com

From Startup to Wunderbrand with Nicholas Kuhne
Why Your Emails Aren't Reaching Inboxes - And How to Fix this!

From Startup to Wunderbrand with Nicholas Kuhne

Play Episode Listen Later Mar 12, 2025 29:03


We discuss why simply using platforms like HubSpot or MailChimp isn't enough anymore, the importance of authentication protocols like DKIM, SPF, and DMARC, and how Google and Yahoo's new rules impact email marketing. Plus, MV shares insights on why email is the glue for your business, the importance of testing and auditing your emails, and how to optimize automations without losing authenticity.If your emails aren't getting the engagement they should, this episode is a must-listen!What next?Want to improve your email deliverability and get out of the spam folder?

More than a Few Words
#1130 - Get to the Inbox | MV Braverman

More than a Few Words

Play Episode Listen Later Feb 25, 2025 12:59


E-mail marketing has changed, and so must your approach if you want to reach your audience in 2025. I chatted with MV Braverman, founder of Inbox Welcome, to talk about e-mail deliverability—a topic often overlooked but absolutely essential. While we all obsess over catchy subject lines and beautiful designs, none of that matters if your e-mails never make it to the inbox. MV shared practical advice to help you understand deliverability and improve your results. Here are a few of the key takeaways: Authentication is Non-Negotiable To combat spam, providers like Google and Yahoo now require senders to authenticate their e-mails. Tools like SPF, DKIM, and DMARC ensure your e-mails are verified and trustworthy. But here's the catch: while platforms like MailChimp can help you authenticate campaign emails, that's only part of the puzzle. MV recommends a comprehensive setup covering all your email streams—like invoices, auto-responders, and proposals. Reporting Matters DMARC doesn't just verify your emails—it also provides detailed reports about where your emails are landing (inbox vs. spam) and how they're being perceived by providers like Microsoft. These insights are invaluable for spotting problems early. Focus on the Reader's Experience Your emails should be accessible, mobile-friendly, and readable in both light and dark modes. MV pointed out that ignoring dark mode—a preference for up to one-third of email users—can make your emails nearly impossible to read. Don't Rely Solely on Images While image-only emails may look appealing, they're a disaster for accessibility. Many readers (including me!) block images by default, and with AI tools summarizing content, text is more important than ever. Always include descriptive, clear text in your emails. What You Can Do: Review your email authentication settings across all platforms, not just your email marketing tool, to ensure full coverage. Download MV's DMARC guide to learn how to set up reporting and spot deliverability issues before they become major problems. Email marketing isn't just about what you say—it's about making sure people actually receive it.  

Rethink Real Estate
Avoid Spam Filters: Tips for Adding Email Marketing to Your Real Estate Business | Rethink Real Estate S4E9

Rethink Real Estate

Play Episode Listen Later Feb 10, 2025 28:19


In this informative episode of 'Rethink Real Estate,' host Ben Brady is joined by Chris Cochran, the Director of Marketing for Harcourts Auctions, to explore the intricate aspects of email marketing strategies in real estate. They delve into the challenges and solutions for preventing emails from being flagged, ensuring emails reach their intended recipients effectively. Chris offers deep insights into the technicalities of email systems, such as DKIM settings and the importance of warming up email domains to maintain a healthy sender reputation.The conversation covers practical tips for real estate professionals on how to manage large databases without triggering spam filters, strategies for segmenting email lists, and the benefits of consistent, value-driven communication to enhance open rates. They also discuss how to handle bounced emails and the significance of using analytics to monitor email performance.Timestamps & Key Topics:[00:00:00] - Introduction to Challenges in Email Marketing for Real Estate [00:01:25] - Chris's Expertise on Avoiding Email Flags[00:02:28] - Technical Explanation of Email Authentication and Health [00:04:07] - Best Practices for Email List Management and Engagement Strategies[00:06:03] - The Impact of Domain Reputation on Email Deliverability [00:07:45] - Techniques for 'Warming Up' Email Domains[00:09:00] - How to Scale Email Campaigns Without Being Flagged [00:10:30] - Tools for Ensuring Email Validity and Reducing Bounce Rates [00:12:16] - The Role of Smart Lead in Email Strategy[00:13:54] - Optimizing Email Open Rates Through Effective Content Strategies[00:16:00] - Transitioning from Marketing Emails to Personalized Communication[00:18:26] - Identifying When Your Email is Flagged and How to Respond [00:19:20] - Diversifying Marketing Approaches to Reduce Dependence on Email

The Cyber Threat Perspective
(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

The Cyber Threat Perspective

Play Episode Listen Later Dec 25, 2024 27:10


Welcome to this replay on The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on how attackers are bypassing advanced email protections.In this episode, we cover:The fundamentals of email spoofing and why it's a significant threat.Insight into the recent echo spoofing campaign exploiting Proofpoint's misconfiguration.The role of SPF, DKIM, and DMARC in combating email spoofing.How threat actors are using Microsoft 365 to bypass email protections.Mitigation strategies and the latest updates from Proofpoint and Microsoft to address these vulnerabilities.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com

The PowerShell Podcast
Jordan Returns: A Fun Dive into Life, PowerShell, and Beyond

The PowerShell Podcast

Play Episode Listen Later Nov 25, 2024 55:48


In this special episode, we catch up with our former cohost, Jordan, and hear about his journey since leaving the PowerShell Podcast. Jordan shares an exciting life update, offers invaluable advice on how PowerShell has shaped his career and participates in our fun "This or That" segment. We reminisce about our favorite podcast moments, discuss a fantastic new PowerShell module for analyzing DKIM records, and explore how Jordan's perspective on PowerShell and automation has evolved. This episode is packed with laughs, insights, and a dose of nostalgia for long-time listeners. Guest Bio and links:  Jordan was a host on the PowerShell Podcast and is a PowerShell lover. You can find him writing code and attending PowerShell Summit 2025 2025 State of System Administration - https://www.surveymonkey.com/r/33F373L PowerShell Script Roast - https://www.youtube.com/watch?v=e58aMWyjf-Y Invoke-SpfDkimDmarc - https://github.com/T13nn3s/Invoke-SpfDkimDmarc https://x.com/DevOpsJordan http://linkedin.com/in/hammondjordan https://bsky.app/profile/andrewpla.tech https://www.linkedin.com/in/andrewplatech/  

Sunny Side Up
Ep. 501 | How AI-Based Detection is Revolutionizing Security

Sunny Side Up

Play Episode Listen Later Nov 16, 2024 22:12


Episode Summary In this episode of OnBase, host Chris Moody talks with Anh Huynh about the evolving role of AI in cybersecurity, especially in email and collaboration systems. Anh shares his journey from early IT setups to today's advanced AI-based security measures, highlighting the shift from heuristics-based to AI-driven threat detection to combat sophisticated business email compromises (BEC). Anh explains how collaboration, communication, and integrating AI across security infrastructures are crucial in staying ahead of cyber threats. They also discuss the importance of emotional intelligence, balancing hybrid work environments, and tools that enhance security and quality of life, especially for remote work. About the guest Anh Huynh is the Director of Messaging Engineering and Head of Security Services at Applied Materials, where he has led teams in securing critical communication infrastructure for nearly five years. In this role, Anh focuses on cybersecurity measures within messaging and collaboration spaces, implementing advanced AI/ML detection processes, and enforcing security protocols like SPF, DMARC, and DKIM to address emerging cyber threats. He also oversees supply chain cybersecurity initiatives, IP protection, and data loss prevention, integrating solutions across platforms like Outlook, Exchange, and Office 365. With over 18 years of experience in global messaging, Anh combines technical expertise with a strategic approach to managing cybersecurity and team development, making him a valuable voice on the role of AI and layered security in modern enterprises.Anh also helps businesses enhance their cybersecurity strategy through his firm, ADH Consulting.Connect with Anh: Phone: 831-277-3525 | Threads: @anhdhuynh75 | Email: anhdhuynh@gmail.com | LinkedIn Key takeaways - AI in Cybersecurity: AI is crucial for detecting sophisticated threats like business email compromises, surpassing traditional methods. - Collaboration is Key: Effective cybersecurity needs strong collaboration and shared intelligence across teams. - Hybrid Work Balance: A balanced mix of in-office and remote work supports productivity and security adaptability. - Layered Security: A multi-layered defense, combining traditional and AI methods, enhances threat detection. - Actionable Insights: AI should provide clear, actionable insights to reduce manual work and improve security. - Emotional Intelligence: Leaders should cultivate emotional intelligence to manage hybrid teams better. - Tech and IoT Tools: Familiarity with various tech ecosystems and using IoT tools can improve personal and professional security. Quotes "The old process of heuristics-based security does not work today in the real world." -Anh HuynhRecommended Resource BooksEmotional Intelligence by Daniel Goleman: It explores how understanding and managing emotions can enhance personal and professional relationships ⁠⁠Connect with Any Huynh | ⁠Follow us on LinkedIn ⁠| ⁠Website

Course Creators HQ
E218: How to Pick an Email Program – and What to Watch Out For!

Course Creators HQ

Play Episode Listen Later Nov 13, 2024 22:05


What should you look for when choosing an email newsletter tool? What if you are considering moving? This episode shares some key features you want to review and evaluate as you put together your company's most valuable asset - your email list! Get the full links and show notes at https://CourseCreatorsHQ.com/218.    LINKS MENTIONED   Note: Some of these are affiliate links, and I earn a small commission when you use them. Thank you!Don't miss this incredible Kajabi Special EXTENDED only through November 15, 2024! You get 50% off for a YEAR, plus 10 weeks of live coaching with me, plus $2K of courses: 24 Hour Course Creator which I've never given away! plus Sales Page Secrets, Joint Venture Secrets and Effortless Email, and my step-by-step, click-by-click Kajabi Kickstart course. I've never seen or done a deal this good to get you set up for 2025! Be sure to pick your plan (I recommend Basic with 3 products or Growth with 15): https://CourseCreatorsHQ.com/Kajabi50off    Or if you are visiting after the deadline - use this link to get a 30 Day Free Trial! https://coursecreatorshq.com/kajabi-signup     Convert Kit / Kithttps://CourseCreatorsHQ.com/ConvertKit  LeadPageshttps://LeadpagesOnline.com  RELATED EPISODES  E187: Funnels, Email & Better Messaging… Oh My!   E176: 7 Key Reasons Email Marketing Isn't Working to Sell Your Online Course   E090: 7 Big Email Mistakes Online Course Creators Make   E052: Email Marketing – The 6 Cs for Online Course Creators   E038: Email Marketing Secrets for Course Creators      KEY TAKEAWAYS FOR ONLINE COURSE CREATORS   Two types of email programs:Primary function is email: ConvertKit (now Kit), ActiveCampaign, Aweber, DripAn All-in-one-Tool that has email built in – plus  runs your entire online business11 Things to Consider:Consider whether you will use an all-in-one-tool.Landing pages to create a funnel.Automation functionality: simple automation is to send a welcome message or complex.Ease of email creation. Automatic integration with your other tools. Check costs as your email size rises.Older tools have bolt-ons. Moving your list: do you have to re-confirm the addresses?Double optin functionality.Email deliverability – complicated process and gets even more complex as your list size grows (SPF, DKIM, DMARC are technical settings).Watch your numbers – especially click through rates. COME VISIT JULIE!  Get on the email list AND get the FREE Ultimate Course Creators Planner -  https://coursecreatorshq.com/2024PlannerPodcast  Get this free course -  Is My Course Idea Any Good? here -https://www.coursecreatorshq.com/ideaGoodPods Let's talk about this episode on GoodPods – https://CourseCreatorsHQ.com/goodpods (mobile only, download the app first) Website https://www.CourseCreatorsHQ.comYouTube  https://coursecreatorshq.com/YouTubePodcast   Facebook https://www.facebook.com/CourseCreatorsHQInstagram  https://www.instagram.com/CourseCreatorsHQTwitter https://www.Twitter.com/CourseHQThreadshttps://www.threads.net/@coursecreatorshq  Disclaimers  https://coursecreatorshq.com/disclaimers/  

Technology for Business
What is DMARC?

Technology for Business

Play Episode Listen Later Nov 6, 2024 32:23


In this episode, we're diving deep into email security with CIT's Director of Cybersecurity, Nate, & Security Engineer, Andrew, as they unravel the complexities & critical importance of DMARC (Domain-based Message Authentication, Reporting & Conformance). Rising threats in email security have prompted Nate and Andrew to explain why organizations need stronger email authentication measures now more than ever. Learn about the roles of SPF, DKIM, and DMARC in verifying sender authenticity, preserving email integrity, and defending against phishing attacks. They'll also share real-world examples, like the costly impacts of unmonitored DMARC policies and challenges in coordinating with third-party vendors. This is essential listening for anyone responsible for keeping email communications safe & secure. Learn more about Email security: https://www.cit-net.com/email-security-what-is-it/ Resources: https://www.darkreading.com/cybersecurity-operations/time-get-strict-dmarc https://www.darkreading.com/cyber-risk/most-us-political-campaigns-lack-dmarc-email-protection

Counsel Cast
How Can Your Law Firm Stay Ahead of Digital Hackers? with Jonathan Steele

Counsel Cast

Play Episode Listen Later Oct 22, 2024 33:16


In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues. Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training. Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape.Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode:Extreme Privacy by Michael BazzellConnect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com 

Counsel Cast
How Can Your Law Firm Stay Ahead of Digital Hackers? with Jonathan Steele

Counsel Cast

Play Episode Listen Later Oct 22, 2024 33:16


In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues.  Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training.  Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape. Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode: Extreme Privacy by Michael Bazzell Connect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com 

Legal Talk Network - Law News and Legal Topics
How Can Your Law Firm Stay Ahead of Digital Hackers? with Jonathan Steele

Legal Talk Network - Law News and Legal Topics

Play Episode Listen Later Oct 22, 2024 33:16


In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues.  Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training.  Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape. Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode: Extreme Privacy by Michael Bazzell Connect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com 

Everbros: Agency Growth Podcast
Why Lead Gen Agencies Need to Become Email Experts | Episode 123

Everbros: Agency Growth Podcast

Play Episode Listen Later Oct 4, 2024 82:47


**Cold Open (AMAZON GIFT CARD CHALLENGE TO LISTENERS / Headlines without Context)****Skip the Cold Open at 19:50**We've had to dive down the email rabbit hole. Exploring SPF, DKIM, DMARC, and SMTP solutions.Why?Because our job is to deliver leads to our clients. When someone fills out a form on our client's site, in order for us to properly get credit for that lead, the client needs to be alerted immediately.However, as 2024 comes to a close, the website and digital marketing space has been plagued by email deliverability issues, which include websites sending lead form submissions.We reflect on what kind of agency we set out to be and how our continued pursuit of being that hands-off agency has led us down the path of becoming technical email deliverability experts.----------------------------------Our recommended agency tools:everbrospodcast.com/recommended-tools/----------------------------------⭐⭐⭐⭐⭐As always, if you enjoyed this episode or this podcast in general and want to leave us a review or rating, head over to Apple and let us know what you like! It helps us get found and motivates us to keep producing this free content.----------------------------------Want to connect with us? Reach out to us on the everbrospodcast.com website, follow us on YouTube, or connect with us on socials:YouTube: @agencyuTwitter/X: @theagency_uLinkedIn: linkedin.com/company/agencyuFacebook: facebook.com/theagencyuInstagram: @theagencyuReddit: u/JakeHundleyTikTok: @agency.u

The SysAdmin DOJO Podcast
The Magic Behind DMARC, DKIM, and SPF?

The SysAdmin DOJO Podcast

Play Episode Listen Later Sep 6, 2024 27:39


In this episode of the Security Swarm Podcast, host Andy and his guest Michael Posey discuss the email authentication protocols of SPF, DKIM, and DMARC. They explain what these protocols are, how they work, and why they are important for protecting against email spoofing and impersonation attacks.  Michael shares his insights from working with MSPs and the channel, noting that while these protocols are not overly complex, they are often overlooked or misunderstood by IT professionals. The hosts dive into the specifics of each protocol - SPF defines which mail servers are allowed to send email for a domain, DKIM adds a cryptographic signature to validate the message's origin and integrity, and DMARC ties the two together to specify how receivers should handle authentication failures.  The discussion covers the benefits of these protocols in improving email security and reputation, as well as the importance of adopting them industry-wide to reduce impersonation tactics used by threat actors. The hosts also touch on the history of cryptography and the need to layer security controls rather than relying on any single solution. Overall, this episode provides a comprehensive overview of these essential email authentication standards.  Key Takeaways:  SPF allows domain owners to specify which mail servers are authorized to send email on behalf of their domain. This helps prevent domain spoofing. DKIM Uses cryptographic digital signatures to verify that an email message was sent by the owner of a given domain and has not been tampered with in transit. This adds an extra layer of authentication.  DMARC Brings SPF and DKIM together, allowing domain owners to specify how the receiving mail server should handle messages that fail authentication checks (e.g. quarantine, reject). This provides a standardized policy for handling unauthenticated emails.  The adoption of these email authentication protocols is increasing, with SPF now used by over 90% of domains. As more organizations implement these standards, it becomes harder for threat actors to successfully impersonate domains through email.  While these protocols are valuable tools, they should not be relied upon as the sole security measure. They are one layer in a comprehensive email security strategy that also includes user education, spam filtering, and other security controls.  Timestamps:  (05:50) SPF (Sender Policy Framework)  (11:23) DKIM (DomainKeys Identified Mail)  (16:11) How DMARC brings SPF and DKIM together  (21:32) Key Protocols for Security and Compliance  (24:11) Defense in Depth  Episode Resources:  DMARC Pro Tips What is SPF?  What is DKIM?

eCommerce Marketing Podcast
Ensuring Good Email Deliverability - with Benny Rubin

eCommerce Marketing Podcast

Play Episode Listen Later Sep 2, 2024 38:55


In this episode, email deliverability expert Benny Rubin shares insights on effective cold emailing and avoiding the spam folder. He discusses his background in music and how he transitioned to becoming a B2B marketer. Rubin explains the importance of email marketing in enhancing the customer journey and gives examples of successful email campaigns that improved customer loyalty and conversions. He also highlights the potential for DTC brands to tap into the B2B market and the unique sales opportunities it presents. In this conversation, Arlen Robinson and Benny Rubin discuss strategies for effective cold email marketing. They emphasize the importance of finding the right audience and creating a warm introduction by mentioning previous clients or affinity groups. They also highlight the critical aspects of email deliverability, such as setting up SPF, DMARC, and DKIM records. Additionally, they advise startup businesses to consider multiple lead generation channels and not over-index on one specific channel. In terms of personal interests, Benny shares that he plays the violin and has a soft spot for the band Megadeth. Key Episode Takeaways: Email marketing is a powerful tool that can enhance the customer journey and improve customer loyalty and conversions. Cold emailing can be an effective strategy for reaching out to potential B2B customers and securing large-scale orders. Email is a reliable and cost-effective channel for communication, making it a valuable asset for businesses. DTC brands should consider exploring the B2B market and leveraging email marketing to tap into new sales opportunities. Email is still widely used and checked regularly by consumers, making it a valuable channel for marketing and communication. Find the right audience for your cold email campaign by targeting individuals in specific affinity groups or mentioning previous clients in the same industry. Ensure good email deliverability by setting up SPF, DMARC, and DKIM records and considering the use of subdomains. Don't over-index on one lead generation channel; consider multiple channels to diversify your sources of leads. Personalize your cold emails by mentioning previous clients or affinity groups to create a warm introduction. In addition to email marketing, explore other lead generation channels such as affiliate programs or text messaging. If you feel Benny and his team at Senders can help you, you may visit: https://www.senders.co  For show transcript and past guests, please visit https://www.ecommercemarketingpodcast.com Or on YouTube at: https://www.youtube.com/channel/UC3PgT0NOGzpdPGQtBK0XLIQ  Follow Arlen: Twitter: https://twitter.com/askarlen   Facebook: https://www.facebook.com/arlen.robinson.7   Instagram: https://www.instagram.com/arlenyohance/   LinkedIn: https://www.linkedin.com/in/arlenrobinson/   Past guests on the ecommerce marketing podcast include Neil Patel, Nemo Chu, Luke Lintz, Luke Carthy, Amber Armstrong, Kris Ruby and many more. Thanks for listening. Be sure to subscribe and leave a review.

Under The Canopy: More Than a Marketing Podcast
89: How to Connect Email Sending Domains in HubSpot

Under The Canopy: More Than a Marketing Podcast

Play Episode Listen Later Aug 23, 2024 10:27


In today's episode, where we're diving into the essentials of connecting your email sending domains in HubSpot! We'll walk you through the process step by step, starting from the HubSpot homepage and navigating straight to the email sending domains settings.We'll talk about why verifying your domain is a must (hint: it keeps your emails out of spam folders) and how to add the necessary DNS records for verification. Plus, we'll cover the ins and outs of setting up DKIM, SPF, and DMARC records—no tech degree required.By the end of this episode, you'll be equipped with everything you need to have an authenticated email sending domain in HubSpot, making your emails more reliable and effective. Tune in and let's get your emails landing where they should—right in your audience's inboxes!

Honest eCommerce
Bonus Episode: How DMARC & DKIM Improve Your Email Open Rates with Nikita Vakhrushev

Honest eCommerce

Play Episode Listen Later Aug 15, 2024 24:24


Nikita Vakhrushev has spent the last 7 years immersed in the digital marketing world. After starting his own ecom brand and quickly pivoting into the agency model, he found his place in ecommerce advertising services. After amassing all the marketing skills needed to scale brands, he found great success in email and SMS marketing, which is what he specializes in today! Now after working with over 100+ DTC brands, having the knowledge behind all marketing channels, but sticking with email as his bread and butter, Nikita has a unique perspective on how to get the most out of a brand's retention channels.In This Conversation We Discuss: [00:41] Intro[01:12] Transitioning from retail to agency building[02:49] Transforming solutions into paid expertise[03:27] Learning vs paying to get things done[04:26] Implementing DKIM & DMARC for email security[06:01] Maintaining deliverability with record updates[06:51] Steep learning curves in email configuration[08:04] Navigating DNS zone editor for email verification[09:47] Understanding dynamic and static domain settings[10:51] Navigating edge cases in complex DNS setups[11:46] Creating DMARC records for Shopify and Klaviyo[13:15] Adding DMARC & DKIM to improve email reach[15:07] Suppressing email addresses for better deliverability[17:54] Remove unengaged emails for domain reputation[19:11] Implementing effective list cleaning strategies[20:10] Focusing on email & SMS services across platforms[21:30] Signs you need to seek email marketing help[22:43] ASPEKT: Free audit for your email strategy[23:42] Keep track of your email open rates consistentlyResources:Subscribe to Honest Ecommerce on YoutubeEmail marketing agency for Ecom and DTC brands aspektagency.com/Secure your domain dmarcian.com/  Follow Nikita Vakhrushev linkedin.com/in/nikita-v/If you're enjoying the show, we'd love it if you left Honest Ecommerce a review on Apple Podcasts. It makes a huge impact on the success of the podcast, and we love reading every one of your reviews!

Hacker News Recap
June 17th, 2024 | FTC sues Adobe for hiding fees and inhibiting cancellations

Hacker News Recap

Play Episode Listen Later Jun 18, 2024 17:57


This is a recap of the top 10 posts on Hacker News on June 17th, 2024.This podcast was generated by wondercraft.ai(00:33): FTC sues Adobe for hiding fees and inhibiting cancellationsOriginal post: https://news.ycombinator.com/item?id=40707558&utm_source=wondercraft_ai(02:04): How to get stuff repaired when the manufacturer don't wanna: take 'em to courtOriginal post: https://news.ycombinator.com/item?id=40702782&utm_source=wondercraft_ai(03:53): Htmx 2.0.0 has been releasedOriginal post: https://news.ycombinator.com/item?id=40709769&utm_source=wondercraft_ai(05:31): Trading cards with e-ink displays (2023)Original post: https://news.ycombinator.com/item?id=40705222&utm_source=wondercraft_ai(07:17): DJI ban passes the House and moves on to the SenateOriginal post: https://news.ycombinator.com/item?id=40705196&utm_source=wondercraft_ai(09:15): Being laid off and unplanned entrepreneurshipOriginal post: https://news.ycombinator.com/item?id=40704428&utm_source=wondercraft_ai(11:00): EU to greenlight Chat Control tomorrowOriginal post: https://news.ycombinator.com/item?id=40710993&utm_source=wondercraft_ai(12:30): “Attention assault” on FandomOriginal post: https://news.ycombinator.com/item?id=40711086&utm_source=wondercraft_ai(14:08): Understanding SPF, DKIM, and DMARC: A Simple GuideOriginal post: https://news.ycombinator.com/item?id=40708476&utm_source=wondercraft_ai(15:50): TDK claims solid state battery breakthroughOriginal post: https://news.ycombinator.com/item?id=40706164&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

The RV Entrepreneur
Email Marketing and Solopreneur Survivor Skills with Liz Wilcox - RVE 343

The RV Entrepreneur

Play Episode Listen Later May 23, 2024 49:14


If you hate email as much as most entreprenuers do, this episode is for you. Email marketing is a must for any small buiness. But connecting with customers in their inbox can be challenging, and time consuming. Liz Wilcox says it doesn't have to be! Join Jim on this deep dive with Liz on the subject everyone loves to hate: Email Marketing? What does it mean, how do you use it to your advantage, and where do you begin? You'll learn how to write a good subject line, and how that is NOT the most important thing to get people to open your email. Discover the different types of email, when to send them, and what they should say. You'll hear some recommended email management platforms, and learn how to determine which one might be best for you. Liz also explains Automations, and how to best use them, or not. You'll understand what DMARC, DKIM and SPF authentications are, and why they're important. Finally, Liz shares her experience on the TV show survivor, and some survival tips that translate to your business and marketing efforts. GUEST BIO The Fresh Princess of Email Marketing, Liz Wilcox is an Email Strategist and Keynote Speaker showing small businesses how to build online relationships, package up their “magic” and turn it into emails that people want to read and, most importantly, purchase from. Connect with Liz: https://lizwilcox.com/ https://www.facebook.com/groups/emailmarketingwithliz https://www.instagram.com/thelizwilcox/ RESOURCES MENTIONED Mailchimp: https://mailchimp.com/ ConvertKit: https://convertkit.com/ ActiveCampaign: https://www.activecampaign.com/ Grit, by Angela Duckworth https://amzn.to/49fBiCc RVE Community Group https://www.facebook.com/groups/therventrepreneurcommunity/posts/460410370968196/ RVE Podcast Episode #164 https://podcasters.spotify.com/pod/show/rve/episodes/RVE-164-How-to-Stand-Out-and-Get-Noticed-with-Ed-and-Liz-Wilcox-ea378t The Virtual Campground https://thevirtualcampground.com/ ~~~~~~~~~~~~~~~~~~~~~THE RV ENTREPRENEUR⁠https://therventrepreneur.com~~~~~~~~~~~~~~~~~~~~~ Join the RVE community on Facebook!⁠https://www.facebook.com/groups/therventrepreneurcommunity Connect with RVE on all your favorite socialshttps://therventrepreneur.com/connect⁠⁠ Got questions or comments for our hosts? Leave us a voice message! ⁠https://therventrepreneur.com/voicemail⁠ (NOTE: Audio submitted may be published on the podcast unless specifically requested otherwise.) Got a great story or tips to share with RVE Listeners? Complete our Guest Intake Form:⁠https://therventrepreneur.com/guestform ~~~~~~~~~~~~~~~~~~~~~The RV Entrepreneur is presented by RV Life – Tools that Make Camping Simplehttps://rvlife.com You May Also Like: The RV Life Podcasthttps://podcast.rvlife.com/~~~~~~~~~~~~~~~~~~~~~ --- Send in a voice message: https://podcasters.spotify.com/pod/show/rve/message

Business of Tech
Record Low in Ransomware Payments & New Cybersecurity Enhancements, Email Authentication Challenges

Business of Tech

Play Episode Listen Later Apr 24, 2024 11:54


The cybersecurity landscape is witnessing a significant shift, with a record low of 28% of companies paying ransomware demands in the first quarter of 2024. This decline in payment rates reflects a positive trend, signaling a growing reluctance among organizations to yield to ransomware demands. However, the data also reveals a troubling development in the ransomware arena.Over half of IT decision-makers encounter challenges in implementing email authentication tools like SPF, DKIM, and DMARC. This struggle stems from the complexity and technical expertise required to set up and maintain these authentication protocols effectively.The impending changes to email services by major providers such as Google and Yahoo further underscore the importance of deploying robust email authentication measures. As these changes take effect, IT decision-makers must ensure their organizations comply with the new requirements to avert email delivery issues and potential security vulnerabilities.Four things to know today00:00 Record Low in Ransomware Payment Rates, with $1.1 Billion Paid in Q1 2024, Reports Coveware05:03 Over Half of IT Decision-Makers Struggle with Email Authentication Tools, Reveals EasyDMARC Study06:55 New Scam Alert: Cybercriminals Using Fake Podcast Invitations to Harvest Credentials08:02 ConnectWise and Microsoft Enhance SMB Cybersecurity with New Defender for Business Integrations  Supported by:  https://skykick.com/mspradio/https://huntress.com/mspradio/   All our Sponsors:   https://businessof.tech/    Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Bitch Slap  ...The Accelerated Path to Peace!
700 - Mastering the Inbox: Scott Cohen's Proven Strategies for Email Marketing Success

Bitch Slap ...The Accelerated Path to Peace!

Play Episode Listen Later Apr 17, 2024 61:40


In this episode, I sit down with Scott Cohen, VP of Marketing Strategy at Inbox Army and an expert with over twenty years in email marketing. We discuss the evolving landscape of email campaigns, the intricacies of regulatory compliance, and his personal experiences in managing high-stakes email marketing programs. Scott offers profound insights into creating impactful content that resonates with audiences and survives the strict scrutiny of spam filters.Show Notes:Scott Cohen: Learn more about Scott, the VP of Marketing Strategy at Inbox Army, by visiting Inbox Army's website. Scott has been recognized for his substantial contributions to the field, including receiving the Stephen Pollard Email Marketer of the Year award in 2021.Email Marketing Insights: Scott discusses strategies for navigating the changing regulations of email marketing, ensuring compliance, and achieving effective audience engagement. He also shares tips on how to enhance email deliverability and effectiveness through the proper use of authentication techniques like SPF, DKIM, and DMARC.Deep Dive into Campaign Strategies: We cover topics such as managing large-scale email campaigns, the psychology behind email engagements, and how to craft emails that not only reach the inbox but also compel action.Connect with Scott: Follow Scott on LinkedIn to stay updated with his latest insights and projects in email marketing. Scott's LinkedIn Mischa's Stuff!Guest Speak On 50 Podcasts In 100 Days! Join The Influence Army Waitlist HERE!Join The Influence Army Newsletter Here!Email me: contact@belove.mediaFor social Media: FaceBook - https://www.facebook.com/MrMischaLinkedIn - https://www.linkedin.com/in/mischaz/Subscribe and share with your business associates who could use a listen!

Syntax - Tasty Web Development Treats
732: Stop going to Spam: DMARC, SPF and DKIM Explained

Syntax - Tasty Web Development Treats

Play Episode Listen Later Feb 19, 2024 26:22


Wes and Scott explore the web standards and email authentication methods that keep your email from going to spam; DMARC, SPF and DKIM. If you send email via a custom domain name, you need to listen to this! Show Notes 00:00 Welcome to Syntax! 01:06 Brought to you by Sentry.io. 02:08 What exactly are SPF, DKIM, and DMARC? 02:53 Different ways that you may want to send email. 03:23 Transactional emails. Resend, email for developers 05:07 Email marketing. 05:47 Anything else that sends email on your behalf. 07:13 SPF (Sender Policy Framework). Postmark defines SPF Postmark SPF in 5 Minutes 08:34 You can only have one SPF record. 10:18 DKIM (DomainKeys Identified Mail). Postmark defines DKIM 13:39 DMARC (Domain-based Message Authentication, Reporting, and Conformance). Convertkit 16:38 RUA Reporting. 18:03 How to set up reporting. 21:08 Does emails marked as spam hurt the IP that sends them? 22:18 Other things to consider. Special thanks to David Flanagan for the help on this! @rawkode Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott:X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads

Do This, NOT That: Marketing Tips with Jay Schwedelson l Presented By Marigold
GMAIL & YAHOO Email Changes YOU NEED TO KNOW! I Expert Quick Tips

Do This, NOT That: Marketing Tips with Jay Schwedelson l Presented By Marigold

Play Episode Listen Later Jan 19, 2024 30:52


In this episode of Do This, NOT That, host Jay Schwedelson interviews Alison Cooley, the Director of Growth Marketing at Marigold, about upcoming changes to Gmail and Yahoo's email deliverability requirements that go into effect on February 1st. They explain the four key requirements, dispel myths about the changes, and share resources to help listeners ensure compliance. Expect to learn practical steps to authenticate your emails, keep spam complaints low, implement one-click unsubscribe links, and process unsubscribes faster.Key Discussion Points- The 4 key deliverability requirements from Gmail and Yahoo- Authenticating your emails (SPF, DKIM, DMARC)- Keeping spam complaints under 0.3%- Adding a one-click unsubscribe header- Processing unsubscribes within 2 daysFor additional resources about the Google/Yahoo deliverability changes coming in February 2024, check out...Marigold's eBook: Demystifying Deliverability Changing Coming in 2024: https://go.campaignmonitor.com/demystifying-deliverability-pm Marigold's Webinar: How to Prepare for the Upcoming Google and Yahoo Deliverability Changes: https://go.campaignmonitor.com/how-to-prepare-for-the-upcoming-google-yahoo-deliverability-changes-od-pm Plus, get the latest insights on consumer trends and preferences in Marigold's 2024 Global Consumer Trends Index: https://go.campaignmonitor.com/2024-global-cti-report-pmAnd MASSIVE thank you to our Sponsor, Marigold!!Marigold is a relationship marketing platform designed to help you acquire new customers and turn them into superfans with their best-in-class loyalty solutions. Don't take my word for it though, American Airlines, Honeybaked Ham, Title Boxing, and Notre Dame University are also customers!Regardless of your size, check out Marigold today to get the solution you need to grow your business!