{"id":27766,"date":"2022-05-20T11:53:12","date_gmt":"2022-05-20T11:53:12","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=27766"},"modified":"2025-05-08T21:19:53","modified_gmt":"2025-05-08T21:19:53","slug":"weekly-email-security-news-recap-3","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/","title":{"rendered":"Weekly Email Security News Recap #3"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cybercriminals constantly breach networks, steal data, and threaten almost every aspect of the internet nowadays. That&#8217;s why we always have <a href=\"https:\/\/easydmarc.com\/blog\/4-email-security-best-practices-to-protect-your-organization-in-2021\/\">email security<\/a> or cybersecurity news to share.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the latest top stories of the past week.<\/span><\/p>\n<h2><b>The U.S. Government Warns About the Illicit Actions of North Korean I.T. workers<\/b><b><\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The third week of May has already begun with malicious activities and data leakage attempts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Monday, the U.S. Department of State, the U.S. Department of the Treasury, and the F.B.I. issued an advisory warning of suspicious activities by North Korean I.T. workers associated with the country\u2019s authoritarian regime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The U.S. Government warns\u00a0 U.S. companies to be conscious when hiring remote I.T. freelancers from other countries. According to the agencies,\u00a0 such North Korean workers have tried to gain access to corporate networks for malicious reasons.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In many cases,\u00a0 I.T. workers from the Democratic People\u2019s Republic of Korea (DPRK) procure forged documents such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Passports<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Work visas<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social security cards<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Credit card and utility statements<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">They use stolen information to introduce themselves as U.S.-based or pretend to be non-North Korean. The <\/span><a href=\"https:\/\/ofac.treasury.gov\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">alert<\/span><\/a><span style=\"font-weight: 400;\"> provides 16 pages of information about the tactics for getting hired, methods, and interests of North Korea.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Suspected activities of illicit DPRK I.T. workers include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Engaging in malicious cyber-enabled activities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Providing logistical support to DPRK-based malicious cyber actors<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assisting with the DPRK&#8217;s money-laundering and virtual currency transfers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sharing access to virtual infrastructure<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enabling the use of data stolen by DPRK cyber actors<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The Department of State&#8217;s Rewards for Justice program rewards up to $5 million for providing any information about criminal DPRK activities in cyberspace.<\/span><\/p>\n<h2><b>1.8 Million Texan&#8217;s Sensitive Information Exposed by a Data Breach<\/b><b><\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Moving on to Wednesday, new details have emerged of a massive data breach discovered in January.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Texas Department of Insurance (TDI) released more information on a breach of 1.8 million Texan&#8217;s sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the agency regulating Texas&#8217; insurance industry claims, the leak was due to a programming code error. The error allowed internet access to a protected area of the application.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/sao.texas.gov\/Reports\/Main\/22-028.pdf\"><span style=\"font-weight: 400;\">audit<\/span><\/a><span style=\"font-weight: 400;\">, published on May 12, discovered that between March 2019 and January 2022, workers&#8217; personal information related to compensation claims may have been accessible to individuals outside of the TDI.<\/span><\/p>\n<p><b>The information includes:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Names<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dates of birth<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phone numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Addresses<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social Security numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information about injuries<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information about workers&#8217; compensation claims<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The TDI previously said they&#8217;d send letters to people who may have been impacted by the event. The department also provided a contact number for individuals to check whether their compensation claims are affected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the TDInever stated how many of the 1.8 million affected Texans received such letters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After a forensic cybersecurity agency was hired to fix the issue and correct the programming code, the temporarily disconnected TDI web application was put back online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The state&#8217;s insurance department announced that it would organize a 12-month credit monitoring and identity protection service for people affected by the data breach.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although data security awareness has increased, these incidents show that <\/span><a href=\"https:\/\/easydmarc.com\/blog\/11-ways-to-prevent-data-loss-and-data-breaches-in-2022\/\"><span style=\"font-weight: 400;\">data leaks and breaches<\/span><\/a><span style=\"font-weight: 400;\"> are an issue that won&#8217;t just disappear.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Major data breaches hit huge companies every year, and millions of people are affected.<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/\"><span style=\"font-weight: 400;\">EasyDMARC<\/span><\/a><span style=\"font-weight: 400;\"> once again wants to remind you to stay protected and follow best practices to protect your cyberspace.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals constantly breach networks, steal data, and threaten &#8230;<\/p>\n","protected":false},"author":6,"featured_media":27863,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,202],"tags":[],"class_list":["post-27766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-news-round-up"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Weekly Email Security News Recap #3 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Email Security News Recap #3\" \/>\n<meta property=\"og:description\" content=\"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-20T11:53:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-08T21:19:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Knarik Petrosyan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Knarik Petrosyan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/\"},\"author\":{\"name\":\"Knarik Petrosyan\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\"},\"headline\":\"Weekly Email Security News Recap #3\",\"datePublished\":\"2022-05-20T11:53:12+00:00\",\"dateModified\":\"2025-05-08T21:19:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/\"},\"wordCount\":565,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/top-image-new-05.10.jpg\",\"articleSection\":[\"Blog\",\"News Round-Up\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/\",\"name\":\"Weekly Email Security News Recap #3 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/top-image-new-05.10.jpg\",\"datePublished\":\"2022-05-20T11:53:12+00:00\",\"dateModified\":\"2025-05-08T21:19:53+00:00\",\"description\":\"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/top-image-new-05.10.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/top-image-new-05.10.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image new 05 10\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News Round-Up\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/news-round-up\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Weekly Email Security News Recap #3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\",\"name\":\"Knarik Petrosyan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"caption\":\"Knarik Petrosyan\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/knarik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Weekly Email Security News Recap #3 | EasyDMARC","description":"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Email Security News Recap #3","og_description":"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.","og_url":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-05-20T11:53:12+00:00","article_modified_time":"2025-05-08T21:19:53+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","type":"image\/jpeg"}],"author":"Knarik Petrosyan","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Knarik Petrosyan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/"},"author":{"name":"Knarik Petrosyan","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923"},"headline":"Weekly Email Security News Recap #3","datePublished":"2022-05-20T11:53:12+00:00","dateModified":"2025-05-08T21:19:53+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/"},"wordCount":565,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","articleSection":["Blog","News Round-Up"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/","url":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/","name":"Weekly Email Security News Recap #3 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","datePublished":"2022-05-20T11:53:12+00:00","dateModified":"2025-05-08T21:19:53+00:00","description":"The latest cybersecurity and email security breach news is here. Check out headline stories and stay informed.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","width":1440,"height":910,"caption":"top image new 05 10"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"News Round-Up","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/news-round-up\/"},{"@type":"ListItem","position":4,"name":"Weekly Email Security News Recap #3"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923","name":"Knarik Petrosyan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","caption":"Knarik Petrosyan"},"url":"https:\/\/easydmarc.com\/blog\/author\/knarik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/05\/top-image-new-05.10.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=27766"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27766\/revisions"}],"predecessor-version":[{"id":47397,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/27766\/revisions\/47397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/27863"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=27766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=27766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=27766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}