<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Sender Audit Blog</title><link>https://senderaudit.com/blog/en/tags/security/</link><description>Recent content in Security on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 28 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Shadow IT and Email: The Tools Sending on Your Behalf Without You Knowing</title><link>https://senderaudit.com/blog/en/shadow-it-email/</link><pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/shadow-it-email/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;, &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt;, and &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt;. Your email infrastructure is under control. Then one day, while analyzing your &lt;a href="https://senderaudit.com/blog/en/understanding-dmarc-reports/"&gt;DMARC reports&lt;/a&gt;, you discover dozens of unknown IPs sending emails on behalf of your domain. Not phishing - internal tools that nobody in IT ever approved.&lt;/p&gt;
&lt;p&gt;Welcome to the world of &lt;strong&gt;email shadow IT&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="what-is-email-shadow-it"&gt;What Is Email Shadow IT&lt;/h2&gt;
&lt;p&gt;Shadow IT refers to the use of technology services without explicit approval from the IT team. Applied to email, it&amp;rsquo;s extremely common: business teams configure SaaS tools to send emails from your domain without going through IT.&lt;/p&gt;</description></item><item><title>DMARC: Safely Migrating from p=none to p=reject</title><link>https://senderaudit.com/blog/en/dmarc-none-to-reject/</link><pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dmarc-none-to-reject/</guid><description>&lt;p&gt;You&amp;rsquo;ve published your &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; record with &lt;code&gt;p=none&lt;/code&gt;. That&amp;rsquo;s a good start, but &lt;code&gt;p=none&lt;/code&gt; blocks nothing: fraudulent emails still get through. The end goal is &lt;code&gt;p=reject&lt;/code&gt;, and this guide walks you through the migration without breaking your legitimate mail flows.&lt;/p&gt;
&lt;h2 id="why-pnone-isnt-enough"&gt;Why p=none Isn&amp;rsquo;t Enough&lt;/h2&gt;
&lt;p&gt;With &lt;code&gt;p=none&lt;/code&gt;, you&amp;rsquo;re asking mailbox providers to &lt;strong&gt;do nothing&lt;/strong&gt; when an email fails DMARC. You receive RUA reports, but:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Emails spoofing your domain still reach inboxes&lt;/li&gt;
&lt;li&gt;Your domain can be used for phishing&lt;/li&gt;
&lt;li&gt;Google and Yahoo now require a published DMARC record, but the real benefits start at &lt;code&gt;p=quarantine&lt;/code&gt; or &lt;code&gt;p=reject&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="recommended-timeline"&gt;Recommended Timeline&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Week&lt;/th&gt;
 &lt;th&gt;Policy&lt;/th&gt;
 &lt;th&gt;Goal&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;W1-W2&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=none; rua=mailto:...&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Collect reports, inventory sources&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W3-W4&lt;/td&gt;
 &lt;td&gt;Report analysis&lt;/td&gt;
 &lt;td&gt;Identify each source IP, fix SPF/DKIM&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W5-W6&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Test on 10% of traffic&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W7-W8&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Gradually increase&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W9-W10&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=100&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Observe for 2 weeks&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W11-W12&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Begin gradual rejection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W13-W14&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Scale up&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W15+&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=100; sp=reject&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Full protection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This timeline is indicative. The key is to &lt;strong&gt;never skip a step&lt;/strong&gt; without verifying that reports are clean.&lt;/p&gt;</description></item><item><title>Reading and Understanding DMARC Reports (RUA)</title><link>https://senderaudit.com/blog/en/understanding-dmarc-reports/</link><pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/understanding-dmarc-reports/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; with a &lt;code&gt;rua=&lt;/code&gt; tag and reports are starting to arrive. But what do you do with these often incomprehensible XML files? This guide teaches you how to read them, interpret them, and take concrete action.&lt;/p&gt;
&lt;h2 id="what-is-a-dmarc-rua-report"&gt;What Is a DMARC RUA Report&lt;/h2&gt;
&lt;p&gt;An RUA (Report URI Aggregate) report is an XML file sent daily by mailbox providers (Google, Microsoft, Yahoo, etc.) to the address defined in your DMARC record.&lt;/p&gt;</description></item><item><title>TLS and Email: Why SMTP Encryption Is Non-Negotiable</title><link>https://senderaudit.com/blog/en/tls-email-encryption/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/tls-email-encryption/</guid><description>&lt;p&gt;You may have seen a &lt;strong&gt;red padlock&lt;/strong&gt; in Gmail with the message &amp;ldquo;The sender hasn&amp;rsquo;t encrypted this message&amp;rdquo;. This means the email traveled in plain text between servers, without TLS encryption. In 2026, that&amp;rsquo;s a serious red flag.&lt;/p&gt;
&lt;h2 id="why-encrypt-emails-in-transit"&gt;Why Encrypt Emails in Transit&lt;/h2&gt;
&lt;p&gt;Without TLS, email content travels in &lt;strong&gt;plain text&lt;/strong&gt; between the sending and receiving servers. Anyone intercepting network traffic (man-in-the-middle attack, compromised ISP, public Wi-Fi) can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Read&lt;/strong&gt; the entire message content&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Modify&lt;/strong&gt; the message in transit&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Extract&lt;/strong&gt; attachments, credentials, links&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;TLS encryption creates an &lt;strong&gt;encrypted tunnel&lt;/strong&gt; between the two SMTP servers. Even if intercepted, the traffic is unreadable.&lt;/p&gt;</description></item><item><title>Anatomy of a DKIM Signature: Every Field Explained</title><link>https://senderaudit.com/blog/en/dkim-signature-anatomy/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-signature-anatomy/</guid><description>&lt;p&gt;You know that &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt; signs your emails. But what exactly is inside that &lt;code&gt;DKIM-Signature&lt;/code&gt; header? Let&amp;rsquo;s break down every field and follow the verification process from start to finish.&lt;/p&gt;
&lt;h2 id="a-real-dkim-header-dissected"&gt;A Real DKIM Header, Dissected&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=example.com; s=selector2024;
 h=from:to:subject:date:mime-version:content-type;
 bh=2jUSOH9NhtVGCQWNr9BrIAPreKQjO6Sn7XIkfJVOzv8=;
 t=1714123456;
 b=dHJ5aW5nIHRvIHJlYWQgdGhpcyBzaWduYXR1cmU/IE5pY2Ug
 dHJ5IDspIFRoaXMgaXMganVzdCBhIGR1bW15IGV4YW1wbGU=
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="every-field-explained"&gt;Every Field Explained&lt;/h2&gt;
&lt;h3 id="v1-version"&gt;&lt;code&gt;v=1&lt;/code&gt;: Version&lt;/h3&gt;
&lt;p&gt;The DKIM protocol version. Only one version exists (&lt;code&gt;1&lt;/code&gt;), defined by &lt;a href="https://datatracker.ietf.org/doc/html/rfc6376"&gt;RFC 6376&lt;/a&gt;. This field is mandatory.&lt;/p&gt;
&lt;h3 id="arsa-sha256-algorithm"&gt;&lt;code&gt;a=rsa-sha256&lt;/code&gt;: Algorithm&lt;/h3&gt;
&lt;p&gt;Two elements combined:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cryptosystem&lt;/strong&gt;: &lt;code&gt;rsa&lt;/code&gt; (most common) or &lt;code&gt;ed25519&lt;/code&gt; (emerging, &lt;a href="https://datatracker.ietf.org/doc/html/rfc8463"&gt;RFC 8463&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hash function&lt;/strong&gt;: &lt;code&gt;sha256&lt;/code&gt; (standard) or &lt;code&gt;sha1&lt;/code&gt; (obsolete and vulnerable, do not use)&lt;/li&gt;
&lt;/ul&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Combination&lt;/th&gt;
 &lt;th&gt;Status&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Standard, recommended&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha1&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Obsolete, some providers reject it&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;ed25519-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Future standard, partial support&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="crelaxedrelaxed-canonicalization"&gt;&lt;code&gt;c=relaxed/relaxed&lt;/code&gt;: Canonicalization&lt;/h3&gt;
&lt;p&gt;Defines how content is normalized &lt;strong&gt;before&lt;/strong&gt; computing the signature. The format is &lt;code&gt;headers/body&lt;/code&gt;:&lt;/p&gt;</description></item><item><title>DKIM RSA Key Size: 1024 vs 2048 Bits and the Future with Ed25519</title><link>https://senderaudit.com/blog/en/dkim-rsa-key-size/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-rsa-key-size/</guid><description>&lt;p&gt;Your DKIM setup works, signatures pass. But have you checked the &lt;strong&gt;size of your RSA key&lt;/strong&gt;? A key that&amp;rsquo;s too short is a ticking time bomb: it could be cracked, allowing an attacker to sign emails on your behalf.&lt;/p&gt;
&lt;h2 id="the-history-of-dkim-keys-from-512-to-2048-bits"&gt;The History of DKIM Keys: From 512 to 2048 Bits&lt;/h2&gt;
&lt;h3 id="2012-the-end-of-512-bit-keys"&gt;2012: The End of 512-Bit Keys&lt;/h3&gt;
&lt;p&gt;In 2012, researchers demonstrated that a 512-bit RSA key could be cracked in &lt;strong&gt;under 72 hours&lt;/strong&gt; using cheap cloud computing power. The result: anyone could impersonate a domain using a 512-bit key and send perfectly DKIM-signed emails.&lt;/p&gt;</description></item><item><title>BIMI: Display Your Logo in Email Inboxes</title><link>https://senderaudit.com/blog/en/configure-bimi/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-bimi/</guid><description>&lt;p&gt;Have you noticed some senders display their logo next to emails in Gmail or Apple Mail? That&amp;rsquo;s &lt;strong&gt;BIMI&lt;/strong&gt; (Brand Indicators for Message Identification). Beyond branding, BIMI is a powerful trust signal, and it relies on flawless email authentication.&lt;/p&gt;
&lt;h2 id="what-is-bimi"&gt;What Is BIMI?&lt;/h2&gt;
&lt;p&gt;BIMI is an email standard that displays your brand logo directly in the recipient&amp;rsquo;s email client. But it&amp;rsquo;s not just cosmetic:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Trust&lt;/strong&gt;: a verified logo increases recipient confidence&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Open rates&lt;/strong&gt;: studies show a 10-30% increase in opens&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Anti-spoofing&lt;/strong&gt;: BIMI requires DMARC at &lt;code&gt;quarantine&lt;/code&gt; or &lt;code&gt;reject&lt;/code&gt;, which blocks spoofing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Brand visibility&lt;/strong&gt;: your logo appears before the message is even opened&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="who-supports-bimi"&gt;Who Supports BIMI?&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Client / ISP&lt;/th&gt;
 &lt;th&gt;BIMI Support&lt;/th&gt;
 &lt;th&gt;VMC Required?&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Gmail&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Apple Mail (iOS 16+, macOS Ventura+)&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Yahoo / AOL&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;La Poste&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Outlook&lt;/td&gt;
 &lt;td&gt;🔄 In progress&lt;/td&gt;
 &lt;td&gt;,&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Fastmail&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote&gt;
&lt;p&gt;Gmail is the only one requiring a VMC (Verified Mark Certificate). Others display the logo based solely on the DNS record.&lt;/p&gt;</description></item><item><title>How to Configure DMARC to Protect Your Domain</title><link>https://senderaudit.com/blog/en/configure-dmarc/</link><pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dmarc/</guid><description>&lt;p&gt;DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that protects your domain against spoofing and phishing. In this guide, we&amp;rsquo;ll walk through how to set it up properly.&lt;/p&gt;
&lt;h2 id="why-dmarc-is-essential"&gt;Why DMARC Is Essential&lt;/h2&gt;
&lt;p&gt;Without DMARC, anyone can send emails pretending to be your domain. The consequences are serious:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Phishing&lt;/strong&gt;: malicious actors can impersonate your brand&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Damaged reputation&lt;/strong&gt;: ISPs may penalize your domain&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lost trust&lt;/strong&gt;: your recipients can no longer tell which emails are legitimate&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;According to the FBI, business email compromise (BEC) scams, many of which exploit missing DMARC, caused over $2.7 billion in losses in 2022 alone.&lt;/p&gt;</description></item><item><title>DKIM: Sign Your Emails to Prove Their Authenticity</title><link>https://senderaudit.com/blog/en/configure-dkim/</link><pubDate>Sat, 24 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dkim/</guid><description>&lt;p&gt;DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email. The receiving server can verify that the message wasn&amp;rsquo;t altered in transit and that it came from an authorized sender. It&amp;rsquo;s the second pillar of email authentication, after &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="how-dkim-works-the-simple-version"&gt;How DKIM Works, The Simple Version&lt;/h2&gt;
&lt;p&gt;Think of it like sending a letter with a wax seal. The recipient can verify the seal isn&amp;rsquo;t broken (the message is intact) and that the seal matches your crest (you&amp;rsquo;re the legitimate sender).&lt;/p&gt;</description></item></channel></rss>