Tobava Blog

Security insights & updates

Privacy guides, threat breakdowns, and product news from the Tobava team.

RegreSSHion (CVE-2024-6387): What it means for your Linux servers and how to patch fast

A race condition in OpenSSH's signal handler allows unauthenticated remote code execution on glibc-based Linux systems. We break down the exploit, show how to check if your server is vulnerable, and walk through the patch process — including Ubuntu backport awareness so you don't get false positives from scanner tools.

Why your email provider is reading your mail — and what you can do about it

Gmail scans every message to serve targeted ads. Outlook uses "diagnostic data" to improve AI models. Here's how commercial email providers monetise your inbox, and how end-to-end encryption changes the equation.

SPF, DKIM, and DMARC explained — the three records that keep your email out of spam

Deliverability is 80% DNS. If your outbound mail keeps landing in junk, the answer is almost always a missing or misconfigured SPF/DKIM/DMARC record. Here's a plain-English breakdown with copy-paste DNS entries.

Dark web monitoring: what "your email appeared in a breach" actually means

Getting a breach alert is alarming — but most people don't know what to do next. We explain what credential exposure really means, how to check which passwords need changing, and why password reuse is the real threat.

How to set up PGP encryption in Tobava Mail — step by step

PGP (Pretty Good Privacy) adds a second encryption layer on top of our built-in AES-256 storage encryption. We walk through generating your key pair inside Tobava Mail and sending your first end-to-end encrypted message.

Introducing Tobava Mail: encrypted email built by a cybersecurity company

Why did a cybersecurity firm build an email service? Because we got tired of recommending "use ProtonMail" while knowing exactly what flaws commercial providers have. Here's what makes Tobava Mail different — technically.

Phishing in 2026: the new tactics targeting small businesses

AI-generated phishing emails now pass grammar checks, mimic your CEO's writing style, and bypass legacy spam filters. We break down what's changed, what red flags still work, and how to train your team to spot them.

Stay in the loop

Security advisories, product updates, and privacy guides — delivered to your inbox. No spam, unsubscribe any time.