logo
HiCamp Partners Joins EasyDMARC's MSP Program to Enhance Email Security and Deliverability for Clients

HiCamp Partners Joins EasyDMARC's MSP Program to Enhance Email Security and Deliverability for Clients

DOVER, DE, UNITED STATES, April 11, 2025 / EINPresswire.com / -- EasyDMARC, a vendor of the cloud-native email security and deliverability platform, announced today a strategic partnership with HiCamp Partners, a leading email marketing agency, based in New York, USA.
This partnership will help HiCamp Partners protect their clients' email domains from being used for phishing and other fraudulent activities, as well as improve their email deliverability rate.
Email security has become a significant concern for businesses of all sizes as cyberattacks, such as phishing and spoofing, are becoming increasingly sophisticated. Verizon DBIR mentions that 93% of all successful cyberattacks begin with a phishing email.
In light of this, HiCamp Partners has taken a proactive approach to help its clients secure their email domains and protect their sensitive information.
'At HiCamp Partners, ensuring flawless email deliverability is a top priority for our clients. EasyDMARC has been instrumental in streamlining authentication protocol setup and optimization, helping us fix DNS misalignments that could otherwise block crucial emails. Their platform makes what can be a complex process significantly more manageable, allowing us to focus on driving results for eCommerce brands., ' said Nolan Butler, Co-Founder at HiCamp Partners.
'We are thrilled to welcome HiCamp Partners to our growing partner network. Their commitment to delivering exceptional IT services and support to their clients aligns perfectly with our mission to make email safer for everyone,' said Gerasim Hovhannisyan, CEO of EasyDMARC.
The DMARC standard enables the automatic flagging and removal of receiving emails that are impersonating senders' domains. It is a crucial way to prevent outbound phishing and spoofing attempts.
About HiCamp Partners
HiCamp Partners is a lifecycle marketing agency specializing in email and SMS for eCommerce brands. The company focuses on optimizing deliverability, crafting high-converting campaigns, and building retention strategies that drive long-term revenue.
About EasyDMARC
EasyDMARC is a cloud-native B2B SaaS to solve email security and deliverability problems in just a few clicks. With advanced tools, such as its AI-powered DMARC Report Analyser, DMARC, SPF, DKIM cloud management solutions, and email source reputation monitoring, EasyDMARC's platform helps customers stay safe and maintain the health of their domains without risk.
www.easydmarc.com
Anush Yolyan
EasyDMARC Inc.
+1 8885635277
Legal Disclaimer:

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Billions of Gmail users at risk with new phishing scam — here's how to spot it
Billions of Gmail users at risk with new phishing scam — here's how to spot it

Hamilton Spectator

time05-05-2025

  • Hamilton Spectator

Billions of Gmail users at risk with new phishing scam — here's how to spot it

An eerily convincing phishing message has been making the rounds in recent weeks, bypassing Google's security protections and is putting up to 1.8 billion Gmail users at risk. First highlighted on X by Nick Johnson, founder and chief developer of Ethereum Name Services (ENS), the phishing attack starts off with a message sent from a no-reply@google [.]com address with the email heading 'Security Alert.' Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got: It bypasses Google's DKIM (DomainKeys Identified Mail), a security feature that normally detects email spoofing. Gmail also 'displays it without any warnings,' Johnson said in the post. 'It even puts (the fake subpoena warning) in the same conversation as other, legitimate security alerts,' he added. The message itself claims that a subpoena has been served which orders Google to produce a copy of the target's Google account content. 'This notice is to alert you that a subpoena was issued to Google LLC by a law enforcement that seeks retrieval of information contained in your Google Account,' the message reads. It includes a supposed reference number and a link to the person's 'Google Support Case.' 'The Sites link takes you to a very convincing 'support portal' page,' Johnson said adding that scammers have 'cleverly used because they know people see the domain is and assume it's legit,' he explained. The Sites link takes you to a very convincing "support portal" page. They've cleverly used because they know people will see the domain is and assume it's legit. Clicking 'Upload additional documents' or 'View case' takes the user to a sign-in page that looks like an exact duplicate of the real Google page. 'The only hint it's a phish is that it's hosted on instead of ,' Johnson explained. From there, the target's login credentials are harvested and used to compromise their account. Google Sites ( is a legitimate Google website and page creation tool that allows anyone to build public-facing sites and host content on a page that will show a subdomain in the URL above the page. Not all pages are malicious but attackers targeting Google users sometimes use Google Sites to create and host phishing websites since the sub domain in the URL makes it look legitimate and trustworthy to most users. Making the email appear as if its from a legitimate no-reply@google [.]com address is more complicated though, Johnson said. Attackers typically start by creating a Google account for 'me@domain' and triggering Google to send them a security alert that they then forward to their victims. In a statement sent to Newsweek , a representative from Google said the company is currently in the process of rolling out security updates to address the issue and advises users to avoid giving out credentials without first confirming that the site is legitimate. Users can check the details of the email sender by clicking the small triangle icon beside the 'to me' section on top of the email as shown below. Click this inverted triangle icon beside the 'to me' field to see the sender's details. Pay attention to the 'mailed-by' section in the sender's details. 'Although it was signed by , it was emailed by privateemail[.]com,' Johnson said in the post. Comparison of sender details between a real Google Security Alert email (left) and a subpoena phishing email (right) showing privateemail[.]com, a non google subdomain. Other red flags are the use of in the URL, which indicates the page was made using Google's free web page creation tool, and weird formatting like the use of many white spaces right after the phishing message, according to Johnson.

New Warning Issued As 30 Dangerous Emails Used In Hack Attacks
New Warning Issued As 30 Dangerous Emails Used In Hack Attacks

Forbes

time28-04-2025

  • Forbes

New Warning Issued As 30 Dangerous Emails Used In Hack Attacks

Malicious email comprises 25% of your daily inbox. getty What's the most dangerous thing you do every day at your computer or smartphone? For most people, I would argue, the answer is checking your emails. It's why the likes of Microsoft have introduced strict new email rules for Outlook users, following in the footsteps of Google doing likewise for those using Gmail. I mean, it's not surprising given that attackers use email as a conduit to password and 2FA code theft, and the FBI is now warning people not to click on anything. Now a shocking new report has revealed the true extent to which the communication threat extends, with a staggering 30 malicious emails a day arriving on average. On March 15, I reported that threat analysts working at Hornet Security had confirmed its customers were subject to an astonishing 427.8 million dangerous emails during 2024 alone. And that's just one security organization reporting on its own customer base. The latest Barracuda email threats report, published April 28, doesn't paint a brighter picture, truth be told. If anything, the new analysis just brings the risk your emails present into a brighter light to illuminate the darkness of the email threat landscape. The key takeaways from the report highlight the problem by the numbers: Given that, on average, an individual receives some 121 emails each and every day, that equates to around 30 dangerous emails that you need to protect against. 'Malicious email attachments, QR codes and URLs are used by attackers to distribute malware, launch phishing campaigns and exploit vulnerabilities,' Olesia Klevchuk, product marketing director for email protection at Barracuda, said. The failure of organisations to implement DMARC protections, which would otherwise make it much harder for attackers to impersonate their brand and implement fraudulent attacks using malicious emails, isn't helping. 'Organizations need to mitigate the risks by implementing best practice industry standards and adopting a multi-layered approach to email security,' Klevchuk concluded, 'leveraging AI-driven threat detection to spot attacks hidden in attachments and malicious websites.'

The 5,365 Ransomware Attack Rampage — What You Need To Know
The 5,365 Ransomware Attack Rampage — What You Need To Know

Forbes

time27-04-2025

  • Forbes

The 5,365 Ransomware Attack Rampage — What You Need To Know

Verison's DBIR report reveals ransomware rampage. As cyberattacks of all flavors continue at an astonishing speed, the FBI issues a do-not-click warning and threat actors find worrying new ways to compromise your accounts, do not ignore the old guard. That's the takeaway from the latest Verizon data breach investigations report, which has revealed that the ransomware rampage is far from over. Given that certain ransomware actors are getting a lot of virtual column inches courtesy of a $1 trillion ransom demand if victims don't respond with a DOGE-trolling bullet list of achievements for the week, you might be excused for thinking that the extortion business has become something of a joke. That, dear reader, would be a big mistake. How big? Well, just look at the numbers: according to the 2025 Verizon DBIR, ransomware attacks have risen by 37% since last year, and are now present in 44% of breaches. Despite the silliness of the DOGE Big Balls ransomware attackers, the median ransom amount paid has decreased from $150,000 to $115,000. The numbers that concern me, and should you, are the ones relating to the presence of ransomware malware itself in data breach incidents. The Verizon DBIR report analyzed 22,000 incidents, of which 12,195 were confirmed data breaches. Some 44% of these, 5,365 to be precise, contained ransomware. That is a 37% jump and represents the extent to which the ransomware rampage is impacting businesses. "The DBIR's findings underscore the importance of a multi-layered defense strategy," Chris Novak, vice president of global cybersecurity solutions at Verizon Business, said. "Businesses need to invest in robust security measures, including strong password policies, timely patching of vulnerabilities, and comprehensive security awareness training for employees." The ransomware rampage is set to continue, according to Nick Tuasek, lead security automation architect at Swimlane, who warns that the 'popularization of Ransomware-as-a-Service on the dark web, sophisticated insider threat recruitment efforts by ransomware operators, and the continued rise of the cryptocurrency economy,' will drive this resurgence. Tactics are changing as well, with some threat actors moving to the deletion of data as part of their normal operations, Brandon Williams, chief technology officer at Conversant Group, has warned. 'If this gains traction this year,' Williams said, 'organizations will not have a method to recover by simply paying a ransom and hoping to get a working decryption tool.' The only method of recovery will be backups, but as Williams said, backups do not typically survive these kinds of ransomware breaches. 'According to our own research, ' Williams said, '93% of cyber events involve targeting of backup repositories, and 80% of data thought to be immutable does not survive.' Regardless of the ransomware actor and the ransomware malware deployed, the foundational controls still matter. 'Knowing your total attack surface, testing your environment with an eye toward efficient remediation is key,' Trey Ford, chief information security officer at Bugcrowd, said. Enterprise controls, including visibility, hardening, and MFA for domain admin and remote access, are paramount. 'There is a strong correlational reason cyber insurance underwriters care about those key controls and coverage in the application process,' Ford concluded. If those controls are not adequate, cyber insurance underwriters might have to pay out. Do not let the ransomware rampage swallow your data whole in the coming year; take heed of the warnings and act now to defend your enterprise.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store