{"id":30599,"date":"2022-10-17T18:33:21","date_gmt":"2022-10-17T18:33:21","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=30599"},"modified":"2025-06-26T20:32:07","modified_gmt":"2025-06-26T20:32:07","slug":"weekly-email-security-news-recap-2-october-2022","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/","title":{"rendered":"Weekly Email Security News Recap #2 [October 2022]"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Statistics show that 1 in 5 phishing emails reach workers&#8217; inboxes, which is alarming.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This week&#8217;s email security news and cybersecurity news cover topics such as Facebook users being targeted by mobile apps, sensitive documents of ICO being breached, and Binance Bridge losing $566M.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s move forward to discover the details of these news headlines.<\/span><\/p>\n<h2><b>Facebook Users Targeted by Over 400 Mobile Apps<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Meta security researchers recently discovered 400+ malicious mobile apps out for grabs on Google&#8217;s Play Store and Apple&#8217;s App Store.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Friday, Meta announced that these apps aim to steal Facebook login credentials, allowing cybercriminals to hijack user accounts.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These malicious apps include:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPNs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Photo editors<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business utility<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phone utility apps<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Games<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lifestyle apps<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">etc<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As you can see, the applications target apps that ordinary users download for everyday tasks. Imagine the applications\u2019 impact on users if the investigators weren\u2019t determined to remove them from the stores. Meta also reached out to people whose accounts may have been compromised by these apps.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company announced that the malicious apps were available in third-party app stores, so they encouraged people to be cautious when downloading a new app that requires social media credentials.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These are the malicious apps that Meta listed in its report:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Dress up Charming<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Bamboo VPN<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Candles VPN<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Cartoon Face Photo Editor<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Teana Music Player<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Apex Race Game<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The developers of these apps published fake reviews to convince users that they were legitimate and to balance out bad reviews. The credential-harvesting scheme started as soon as the user installed the malicious apps. As it usually goes, after requiring the victim&#8217;s login credentials, attackers would gain full access to a person&#8217;s account and access private data.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the store swiping action, Meta advised its users to take some security measures like:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deleting the malicious app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Resetting Facebook login credentials<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using a secure password for Facebook<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enabling the two-factor authentication on Facebook<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Logging out of all the devices and authorizing every further login attemp<\/span><\/span><\/li>\n<\/ul>\n<h2><b>Home Office Warned by the ICO After Sensitive Documents Were Breached at London Venue<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">After some sensitive documents were found at a public London venue, the Information Commissioner&#8217;s Office (ICO) issued a <\/span><span style=\"font-weight: 400;\">legal reprimand<\/span><span style=\"font-weight: 400;\"> to the Home Office.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The venue staff members gave the documents (that contained two Extremism Analysis Unit Home Office reports and a Counter Terrorism Policing report) to the police last year. The documents also included personal data, such as Metropolitan Police staff lists.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After a thorough investigation, the government concluded that the Home Office was the most probable source of the documents and blamed the Secretary of State for the Home Department.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the investigation showed, the Home Office didn&#8217;t provide proper security for personal data, even though the data was classified as &#8216;Official Sensitive&#8217; and didn&#8217;t have a sign-out process for terminating documents from the premises.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reprimand set the further necessary actions, which include a review of the following:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Handling instructions around &#8216;Official Sensitive&#8217; data<\/span><\/li>\n<li><span style=\"font-weight: 400;\">A sign-out process when documents exit the office<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Activity provided to staff around handling records containing personal data.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">After the incident, the Home Office has taken steps to prevent such breaches.<\/span><\/span><\/li>\n<\/ul>\n<h2><a href=\"https:\/\/vpnoverview.com\/news\/hacker-exploits-binance-bridge-vulnerability-to-steal-566m\/\" target=\"_blank\" rel=\"noopener\"><b>Cybercriminal Exploits Binance Bridge Vulnerability And Steals $566M<\/b><\/a><\/h2>\n<p><span style=\"font-weight: 400;\">Let&#8217;s move to our next cybersecurity news and email security breach news of the week, and talk about 2022&#8217;s second major cyberattack in cryptocurrency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Friday, Binance, the world&#8217;s largest cryptocurrency exchange in daily trading volume, announced a breach had occurred. An unknown cybercriminal exploited a vulnerability on its native cross-chain bridge and stole two million Binance Coins (BNB)(about $566 million).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to a blog post published later, a total of two million BNB was stolen, and the hacker got the BSC Token Hub to send them one million BNB twice; then, they quickly traded the loot for other crypto assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A researcher at Paradigm <\/span><a href=\"https:\/\/twitter.com\/samczsun\/status\/1578169073505927168\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">explained<\/span><\/a><span style=\"font-weight: 400;\"> that there was a bug in the way that the Binance Bridge verified proofs which could have permitted the hackers to generate random messages.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Luckily, the attacker forged only two messages, and the damage didn&#8217;t end up being worse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before the breach, the hacker filled their wallet using the account-free crypto exchange company, ChangeNOW.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ChangeNOW <\/span><span style=\"font-weight: 400;\">stated<\/span><span style=\"font-weight: 400;\"> that the hacker also moved funds through other crypto exchange platforms, including.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PancakeSwap<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Uniswap<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SushiSwap<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Curve Finance<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alpaca Finance<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">ChangeNOW explained that the hacker&#8217;s activity didn&#8217;t trigger alarm bells on its system as they used a new address.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Changpeng Zhao, the CEO of Binance, announced that user funds are safe with Binance at this point. An investigation is continuing, and the company promised to share more details with all parties later.<\/span><\/p>\n<h3><b>Final Thoughts<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">These were our email security news and cybersecurity news of the week.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll be back with a new email security breach news batch next week. In the meantime, make sure you start <\/span><a href=\"https:\/\/app.easydmarc.com\/register\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">authenticating your email<\/span><\/a><span style=\"font-weight: 400;\"> today!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Statistics show that 1 in 5 phishing emails &#8230;<\/p>\n","protected":false},"author":6,"featured_media":31799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,202],"tags":[],"class_list":["post-30599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-news-round-up"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Weekly Email Security News Recap #2 [October 2022] | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Email Security News Recap #2 [October 2022]\" \/>\n<meta property=\"og:description\" content=\"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-17T18:33:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T20:32:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"911\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Knarik Petrosyan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Knarik Petrosyan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/\"},\"author\":{\"name\":\"Knarik Petrosyan\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\"},\"headline\":\"Weekly Email Security News Recap #2 [October 2022]\",\"datePublished\":\"2022-10-17T18:33:21+00:00\",\"dateModified\":\"2025-06-26T20:32:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/\"},\"wordCount\":818,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg\",\"articleSection\":[\"Blog\",\"News Round-Up\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/\",\"name\":\"Weekly Email Security News Recap #2 [October 2022] | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg\",\"datePublished\":\"2022-10-17T18:33:21+00:00\",\"dateModified\":\"2025-06-26T20:32:07+00:00\",\"description\":\"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg\",\"width\":1440,\"height\":911,\"caption\":\"Weekly Email Security News Recap 2 October 2022 Oct 7 Oct 13 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/weekly-email-security-news-recap-2-october-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News Round-Up\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/news-round-up\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Weekly Email Security News Recap #2 [October 2022]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1274541880d815d0b03dcd039ddac923\",\"name\":\"Knarik Petrosyan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g\",\"caption\":\"Knarik Petrosyan\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/knarik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Weekly Email Security News Recap #2 [October 2022] | EasyDMARC","description":"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Email Security News Recap #2 [October 2022]","og_description":"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.","og_url":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-10-17T18:33:21+00:00","article_modified_time":"2025-06-26T20:32:07+00:00","og_image":[{"width":1440,"height":911,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","type":"image\/jpeg"}],"author":"Knarik Petrosyan","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Knarik Petrosyan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/"},"author":{"name":"Knarik Petrosyan","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923"},"headline":"Weekly Email Security News Recap #2 [October 2022]","datePublished":"2022-10-17T18:33:21+00:00","dateModified":"2025-06-26T20:32:07+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/"},"wordCount":818,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","articleSection":["Blog","News Round-Up"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/","url":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/","name":"Weekly Email Security News Recap #2 [October 2022] | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","datePublished":"2022-10-17T18:33:21+00:00","dateModified":"2025-06-26T20:32:07+00:00","description":"Stay informed with the weekly email security news recap from October 2022. Discover the latest trends and threats to strengthen your email security practices.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","width":1440,"height":911,"caption":"Weekly Email Security News Recap 2 October 2022 Oct 7 Oct 13 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/weekly-email-security-news-recap-2-october-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"News Round-Up","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/news-round-up\/"},{"@type":"ListItem","position":4,"name":"Weekly Email Security News Recap #2 [October 2022]"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1274541880d815d0b03dcd039ddac923","name":"Knarik Petrosyan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abc6be73809ec3cb89422d7191c4e3c3e547b9d6ae12ea979ccf18150662cf1b?s=96&r=g","caption":"Knarik Petrosyan"},"url":"https:\/\/easydmarc.com\/blog\/author\/knarik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/Weekly-Email-Security-News-Recap-2-October-2022-Oct-7-Oct-13-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=30599"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30599\/revisions"}],"predecessor-version":[{"id":48917,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30599\/revisions\/48917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/31799"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=30599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=30599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=30599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}