Saturday, December 6, 2025

North Korea may Target the “White House”? Modeled version of Korean Presidential House was censored.

North Korea edited photos of Kim Jong Un's military inspection, removing a Blue House replica used for training against South Korea.

BLACKPINK Lisa Returns with New Hit ‘New Woman’ Featuring Rosalía

Lisa announced yesterday afternoon that her new song, "NEW WOMAN," will be released on LLOUD Co.'s official website.

Chinese Men Under Investigation for Drone Footage of U.S. Aircraft Carrier in Busan!

Chinese nationals are under police investigation after they were caught photographing a U.S. nuclear-powered aircraft carrier.

That Email from Google?—Google DKIM Flaw Enables Dangerous Replay Phishing Scam

FutureThat Email from Google?—Google DKIM Flaw Enables Dangerous Replay Phishing Scam
Phishing attacks exploiting Google\'s email security vulnerabilities are on the rise / Shutterstock
Phishing attacks exploiting Google’s email security vulnerabilities are on the rise / Shutterstock

A new phishing scheme targeting weaknesses in Google’s email system has been uncovered, according to tech news site TechRadar reported on Monday. Hackers are now sending deceptive emails to users from the address, no-reply@google.com, cleverly bypassing standard security measures.

This sophisticated attack leverages Google’s OAuth (Open Authorization) app. Cybercriminals begin by creating a Google account with the format, me@domain, then develop an OAuth app to embed phishing content in the name field. After gaining access permissions for this email address through Google Workspace, Google unwittingly sends out notification emails on their behalf. While the email footer displays the me@domain address, most recipients overlook this crucial detail, leaving them vulnerable to the scam.

Known as the DomainKeys Identified Mail (DKIM) replay phishing attack, this method exploits a flaw in DKIM’s verification process. The system only checks domain signatures without authenticating the actual sender’s account. To increase their success rate, hackers create phishing pages on trusted domains like, sites.google.com, making it easier to steal user information.

Cybersecurity experts are urging users to exercise caution, even with emails that appear to be from Google. They strongly advise against responding to any requests for information through sites.google.com, as these are likely to be fraudulent.

Check Out Our Content

Check Out Other Tags:

Most Popular Articles