
Barracuda: One in five firms faces monthly email account attacks
Barracuda has published its 2025 Email Threats Report, detailing the current state of email-based risks facing organisations worldwide.
The report, based on Barracuda's threat detection data, reveals that attackers are increasingly moving malicious links and content into email attachments, aiming to bypass detection by conventional security tools. The report stresses the importance of implementing advanced AI-based threat detection to identify these concealed threats.
According to the research, as many as 20% of organisations faced at least one attempted or successful account takeover incident per month. Attackers typically sought access through phishing, credential stuffing, or exploiting weak and reused passwords. Once they have unauthorised access, attackers can steal sensitive data, navigate laterally within an organisation, and disseminate phishing emails from what appear to be trusted sources.
The report states that 23% of HTML attachments are malicious, designating them as the most weaponised type of text file. Indeed, more than three-quarters of all malicious files detected during the research period were HTML files. Despite their legitimate use for sharing content such as newsletters or invitations, these attachments have become a favoured vehicle for cyber attackers.
Furthermore, 68% of malicious PDF attachments and 83% of malicious Microsoft documents contain QR codes designed to redirect users to phishing websites. Among malicious PDF attachments, 12% are linked to Bitcoin sextortion scams, adding another layer to the evolving tactics adopted by cyber criminals.
Nearly half (47%) of email domains analysed in the report do not have Domain-based Message Authentication, Reporting and Conformance (DMARC) set up. Without DMARC, organisations are left more vulnerable to spoofing and impersonation attacks, where cyber criminals exploit the brand's identity to carry out fraudulent activity.
The report also shows that unwanted or malicious spam has risen to account for 24% of all email traffic, underlining the sheer scale of the challenge for IT departments attempting to manage and secure email communications.
Olesia Klevchuk, Product Marketing Director, Email Protection at Barracuda, commented on the findings: "Email remains the most common attack vector for cyberthreats because it provides an easy entry point into corporate networks. Malicious email attachments, QR codes and URLs are used by attackers to distribute malware, launch phishing campaigns and exploit vulnerabilities. Many organisations increase their risk level by failing to implement DMARC, making it possible for attackers to impersonate their brand and implement fraudulent attacks. Organisations need to mitigate the risks by implementing best practice industry standards and adopting a multi-layered approach to email security, leveraging AI-driven threat detection to spot attacks hidden in attachments and malicious websites."
The 2025 Email Threats Report by Barracuda collates proprietary research from February 2025, during which nearly 670 million malicious, spam or unwanted emails were analysed. This extensive data informed the key findings and recommendations described in the report.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

RNZ News
2 hours ago
- RNZ News
IT workers struggling in New Zealand's tight job market
Photo: Unsplash / Sigmond IT professionals appear to be under growing pressure in 2025, with signs of continued job losses as companies respond to economic gloom and expand the use of artificial intelligence. In May, Microsoft announced it would cut approximately 6000 jobs - about 3 percent of its global workforce. The American tech giant said the move was part of a broader strategy to streamline operations and accelerate its AI initiatives. In New Zealand, Health New Zealand confirmed in April it would slash hundreds of IT jobs - about a third of all roles. Some job seekers have described the tech job market as a "nightmare", citing fierce competition and a shortage of opportunities that have made finding employment increasingly difficult. James Zhang spent more than a year applying for IT jobs from China without success. A software developer with roughly 12 years of experience, Zhang has previously held roles at several prominent technology firms in Beijing, including ride-hailing platform DiDi as well as Tencent, the company behind social media platform WeChat. Zhang said one factor behind his decision to seek work in New Zealand's technology sector was the so-called "curse of 35" - a term widely used in China to describe age discrimination in the tech industry, where workers over 35 often face greater risk of layoffs and increasing difficulty securing new roles. "I've had colleagues being laid off continuously since 2018, and it's often the older ones," he said. "In large tech companies, it's common to expect your age to align with your position - for example, by 35, you're supposed to be in a management role. If you're not, the company might see you as underperforming or no longer valuable." Photo: 123rf Zhang, 34, said he began applying for overseas IT jobs from China in 2023, targeting companies in countries such as New Zealand and Canada. However, he said responses from New Zealand employers were rare. "I probably submitted hundreds of CVs to New Zealand tech companies, but I had absolutely no chance of getting an interview," he said. "When an employer was initially interested, they often backed out once they realised I was based in Beijing." By contrast, Zhang said he applied for around 20 to 30 positions in Canada and received at least two interview opportunities. James Zhang is now pursuing a master's degree in IT project management at Auckland University of Technology. Photo: Supplied In a bid to improve his prospects, Zhang moved to New Zealand this February and is now pursuing a master's degree in IT project management at Auckland University of Technology. He hoped the qualification would help him break into the country's competitive tech sector after graduation. Still, he said he remained uncertain about his chances, noting that many New Zealand employers appeared more inclined to hire local candidates. "I'm still studying, so I can only apply for internship positions," he said. "When a New Zealand software company gave a presentation at our school, the eligibility criteria for interns clearly stated that only New Zealand or Australian citizens and permanent residents could apply." Despite years of experience as a senior software engineer in China, Zhang said he would gladly take an entry-level position if it helped him gain a foothold in the industry. Grace Zheng, who graduated from Lincoln University in 2023 with a master's degree in applied computing, has also struggled to find work in the competitive tech job market. "I've probably submitted a hundred CVs over six months," she said. "For most [graduate or junior] positions, there are usually 200 or 300 applicants competing for the same role." Zheng said she received four or five interview invitations but was never called back after the first round. "I was told they had stronger candidates," she said. Discouraged by the lack of progress, Zhang said she had stopped applying for IT jobs this year and was instead focusing on learning new skills to better align with market demands. Photo: 123RF Peter Xia, who has worked as a software tester in New Zealand's tech sector for about five years, said he had been made redundant twice since 2023. "The day before Christmas in 2023, the company announced layoffs," he said. "It specialized in software testing and cut at least 20 percent of its staff in the first round." Xia said he was fortunate to secure another testing role three months later at a start-up, but the company shut down just three months after he joined, citing a lack of investor funding and limited profitability. He likened the IT job market between 2023 and 2024 to a "freezing winter," noting that several roles he applied for were abruptly cancelled during the interview process. Xia said the market appeared to be gradually improving this year, though uncertainty remained. He said all the companies he had previously worked for had hired him on permanent contracts. But after being laid off multiple times, he realized that a permanent contract offered little security in the face of ongoing economic instability. Lisa Cooley, managing director at BrightSpark Recruitment. Photo: Supplied Lisa Cooley, managing director at BrightSpark Recruitment, said New Zealand's tech job market remained flat and competitive, though there were early signs of a gradual recovery. "Employers are adopting a very cautious approach to hiring at the moment," she said. "If they're looking for contractors, they've been favoring more fixed-term. "If they're looking for permanent [staff], they're looking for someone absolute best and ticks 100 percent of the boxes [before] taking the risk to hire." Cooley said immigrants faced greater challenges securing interviews in New Zealand, as the job market has been flooded with candidates in recent years due to economic downturns, large-scale restructures and widespread redundancies. She said visa conditions remained a key factor putting immigrants at a disadvantage in an already competitive market. "The visa process was also taking a very long time for a while," she said. "We were hearing stories of it taking four to five months from end to end. "Obviously, most companies aren't going to wait that long, unless it's for a highly skilled role that few people in New Zealand can fill." Shay Peters, chief executive at recruitment agency Robert Walters Australia and New Zealand. Photo: Supplied Shay Peters, chief executive at recruitment agency Robert Walters Australia and New Zealand, agreed that visa restrictions remained a significant barrier for immigrants seeking work in the tech sector. "The first barrier for immigrants on work visas is their eligibility to generally work only for accredited employers," he said. "Within ICT (information and communication technology), most accredited employers are vendors or consultancies who hire skilled migrant workers and then provide their services to a customer. "Unfortunately, with the lack of funding, customers have to [reduce] spending on vendors or consultancies. There is less opportunity for them to provide to migrant workers." Peters said employer demand had also shifted, with a growing emphasis on highly skilled workers in areas such as cybersecurity and software development. "Organizations are seeking highly specialized and technical resources rather than the 'Jack of all trades' which were popular in 2022," he said. Photo: 123rf Peters said salaries and hourly rates had also recallibrated. Contractors with strong reputations and a strong track record of going above and beyond were still commanding higher rates, while candidates with more generic skillsets - particularly in management roles - were now seeing offers that were $10,000 to $20,000 lower than what they were two or three years ago. Peters said most of the firm's government clients had shifted towards hiring more contractors rather than permanent or fixed-term staff, citing budget constraints and operational headcount limits following recent cuts and restructures. However, the private sector remained relatively steady in its hiring of permanent staff. According to SEEK's latest New Zealand Employment Report , job advertisements in the information and communication technology sector rose by 7 percent from March to April and were also 7 percent higher year on year. Rob Clark, country manager at SEEK New Zealand, said April marked the second consecutive month of positive momentum, suggesting a modest but noticeable job market recovery trend over the past seven months. Cooley said job seekers should not be disheartened by current conditions, as the market appeared to be on the verge of a turnaround. For immigrants, she said building a strong professional network was crucial to securing employment.


NZ Herald
5 hours ago
- NZ Herald
Peter Griffin: It's the end for Windows 10, maybe it's time to consider a Mac
The end is nigh for Windows 10, one of the best computer operating systems Microsoft has produced. Mark your calendars for October 14, 2025, the day Microsoft finally pulls the plug on its most popular OS, leaving millions of users staring into the abyss of unsupported software. No more security


Techday NZ
4 days ago
- Techday NZ
Most high-traffic email domains still vulnerable to phishing
New research from EasyDMARC has found that 92% of the world's top 1.8 million email domains lack adequate protection against phishing attacks. The EasyDMARC 2025 DMARC Adoption Report has revealed that only 7.7% of these domains are fully protected using the strictest DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy, known as 'p=reject'. This policy is designed to actively block malicious emails from being delivered to inboxes. DMARC is an email authentication protocol that builds on existing standards such as SPF and DKIM, allowing domain owners to specify how they want mail servers to handle emails that fail authentication checks. The protocol also enables domain owners to receive reports on emails sent under their domain name, providing vital records of authentication attempts and potential abuse. EasyDMARC's analysis demonstrates that although there has been a noticeable increase in DMARC adoption since 2023 — largely due to regulatory initiatives and mandates from major providers including Google, Yahoo, and Microsoft — most organisations opt for the weakest available configuration, 'p=none'. This setting only monitors for threats, rather than thwarting attacks by blocking illegitimate emails. The report, which reviewed security practices across the most-visited websites globally as well as Fortune 500 and Inc. 5000 companies, shows a continued gap between DMARC adoption and meaningful implementation. More than half (52.2%) of the surveyed domains have not implemented DMARC at any level, leaving them exposed to phishing and spoofing risks. Among domains that do have a DMARC record, most have not configured enforcement policies or reporting mechanisms necessary for full protection. The research also found that over 40% of the domains with a DMARC record did not include any reporting tags. This omission means these organisations have little to no visibility into authentication failures or an understanding of who might be sending emails on their behalf. Gerasim Hovhannisyan, Chief Executive Officer of EasyDMARC, addressed the misconception surrounding DMARC adoption: "There's a growing perception that simply publishing a DMARC record is enough. But adoption without enforcement creates a dangerous illusion of security. In reality, most organisations are leaving the door wide open to attacks targeting customers, partners, or even employees." Mandates have had a measurable effect. In the United States, where regulatory enforcement is strong, the proportion of phishing emails accepted dropped from 68.8% in 2023 to just 14.2% in 2025. Similar progress was noted in the UK and the Czech Republic, countries that also enforce DMARC usage. However, countries without strict requirements, such as the Netherlands and Qatar, showed minimal improvement in reducing phishing acceptance rates. Recent high-profile cyber attacks, including those targeting retailers such as M&S and Co-op, serve as a backdrop for the report's release. In these incidents, attackers exploited weaknesses in email security through social engineering, costing affected businesses hundreds of thousands in losses. According to EasyDMARC, the increasing sophistication of phishing, partly driven by the use of AI, magnifies the risks for organisations that are inadequately protected. Hovhannisyan further commented: "Misconfigurations, missing reporting, and passive DMARC policies are like installing a security system without ever turning it on. Phishing remains one of the oldest and most effective forms of cyberattack, and without proper enforcement, organisations are effectively handing attackers the keys to their business. As threats grow more sophisticated and compliance pressures mount, stopping halfway with DMARC enforcement is no longer an option." The report methodology combined public DNS data with proprietary data collected through EasyDMARC's platform. It involved the review of aggregate DMARC reports from major mailbox providers and included a survey of 980 IT professionals across the United States, United Kingdom, Canada, and the Netherlands. This allowed for insights into regional differences in phishing trends, adoption challenges, and the varying influence of regulatory mandates. The research concludes that while DMARC adoption has increased, genuine protection against phishing relies on both enforcement and visibility — elements still missing for the vast majority of high-traffic domains worldwide.