steveroy, to random

Someone sent an email at my workplace today, impersonating me to change the banking info used for my pay.

I’m amazed that people try stunts like that. But then maybe I shouldn’t be surprised.
#phishing

knitcode, to random

what's the word for when: the phishers who are stealing from the organized crime phishers that you are researching realize that you know they are fake (organized crime) and take down their entire infrastructure and social media presence in a few hours? i was going with "wow" but it doesn't seem quite the right word. i also tried "bummer". #dns #phishing #cybercrime #infoblox

simsus, to random German
@simsus@social.tchncs.de avatar

#Phishing-Welle von Zentralstelle Cybercrime Bayern beobachtet | Security https://www.heise.de/news/Zentralstelle-Cybercrime-warnt-vor-Phishing-Welle-9604611.html

stiefkind, to random German
@stiefkind@mastodon.social avatar

"Ihre Sendung hat den Weg gefunden: Infos innen". Absender ist ein "ZustellHelden Logistik".

Es werd's ma so Helden sei ey … #phishing

InfobloxThreatIntel, to Cybersecurity

We just released the results of collaborative research with @rmceoin on the kingpin of cybercrime traffic distribution: VexTrio. The longest lived, most pervasive threat we see in the wild. VexTrio has over 60 affiliates feeding them victims, including the famous SocGohlish and ClearFake actors. Not just middlemen, they compromise WP sites and run their own campaigns as well. end-to-end criminal gang. https://blogs.infoblox.com/cyber-threat-intelligence/cybercrime-central-vextrio-operates-massive-criminal-affiliate-program/

DFN, to random German
@DFN@mastodon.social avatar

🛡️ Aktive #Cyberabwehr in #DFNSecurity: Die DNS-Firewall startet Ende Januar in den Pilotbetrieb. Ziel: techn. Validierung u. Prüfen der Onboarding- & Dokumentationsprozesse. Sie dient u.a. der Abwehr von 🎣 #Phishing Angriffen. @dfncert #switch_ch Infos: https://www.dfn.de/dfn-security-dns-firewall-startet-in-den-pilotbetrieb/

Codeberg, to random
@Codeberg@social.anoxinon.de avatar

We saw #malware uploads to Codeberg increase in the past weeks. Although our users are likely not the target audience of these files, we still want to remind you:

Watch out and stay secured. Do not run files from untrusted authors.
On Codeberg, double-check the project's legitimacy (e.g. user age, stars / issues / activity) or the source code itself.
Visit the project's homepage and use official download sources.
Never let emails panic you, consider if it's part of a #phishing campaign.

YourAnonRiots, to microsoft Japanese

📢🚨 has warned of an Israel-Hamas-themed phishing scam, accompanied by the use of a custom backdoor called , carried out by the Iranian Mint APT.

https://hackread.com/iran-mint-sandstorm-hamas-israel-phishing-scam/

otter, to infosec

More or less every company has guidance that users shouldn't click links in emails to prevent phishing and other email based attacks. So why do all email clients enable clickable links? There doesn't even seem to be an option to disable such links from incoming emails. 🤔

shawnhooper, to Facebook
@shawnhooper@fosstodon.org avatar

How to disable the ability for "Guest 1234" accounts to message your Facebook Business page.

https://nileflores.com/how-to-disable-messages-from-guest-1234-on-facebook-pages-messenger/

#facebook #phishing

teksquisite, to security

Peacock ongoing #phishing messages to my #icloud email account.
———-
Small print = “After signing up, you have to insert your credit card details for validation of your Peacock ID. We will not withdraw any amount.”
———
OMG! Seriously, my ribs are hurting!

#security #cybersecurity #infosec #technology

Screenshot of a phishing email message for Peacock streaming TV.

euroinfosec, to web3

Crypto-seeking drainer scam-as-a-service operations are thriving, with $295 million in digital assets lost just last year to wallet drainers, researchers warn
https://www.databreachtoday.com/crypto-seeking-drainer-scam-as-a-service-operations-thrive-a-24107 #web3 #malware #phishing #scam

Maltego, to blackfriday

How to investigate a suspect #phishing domain in #Maltego? We divided the workflow into 5 steps:

Step 1: Starting with a Phishing Domain
Step 2: Map out Infrastructure & Threats
Step 3: Dive into Relevant Data
Step 4: Explore Threat Network
Step 5: Uncover Internet Relationships

Our guest author, @MarioRojas, detected and mapped out the network of the phishing sites that flourished during #BlackFriday and #CyberMonday using Maltego, @DomainTools, urlscan.io, and WhoisXML.

Hunt down the fraudulent domains with Maltego NOW: https://www.maltego.com/blog/hunting-phishing-sites-in-the-festive-season-with-maltego/?utm_source=mastodon&utm_medium=social&utm_campaign=CSO&utm_content=maltego.com

redstarfish, to email

I received this mail today from <postmaster@disroot.org> which says my password is about to expire. I'd have considered it phishing email except from the address it came. So when I clicked on the link it took me to https://bonusrnp.com/eky/index.html#abhiseckpaira@disroot.org which is not https://disroot.org.

So I guess it is a phishing attack after all?! #phishing #Email #disroot

Screenshot of the email I received

com, to llm
@com@mastodon.social avatar

Who's making a LLM-based spam filter plugin for #Spamassassin or #Rspamd?

Gmail has advanced AI-based filtering. Now that LLMs are becoming democratized, I'm ready for a self-hosted AI spam filter.

It seems much more popular to publish research papers on the viability of LLM-based spam filtering than it is to build LLM-based spam filtering software. Here are dozens of papers: https://www.arxiv-sanity-lite.com/?rank=pid&pid=2206.02443 Nothing on GitHub, yet.

#llm #ai #spam #phishing #SelfHosting #postfix #exim #sendmail #qmail

protonmail, to ai
@protonmail@mastodon.social avatar

With billions of phishing emails sent daily and making social engineering easier, is the most critical you and your team must be able to recognize.

Take the @frameworkcomputer as a sign to learn these steps: https://proton.me/blog/what-is-phishing

scottwilson, to infosec

Seriously? Does anyone fall for something like this anymore?

realhackhistory, to random
@realhackhistory@chaos.social avatar

Obsessed with this portrayal of #phishing and cybercriminals in the Beekeeper movie, I probably won't ever watch the whole thing but I love this.

Animated gif of a woman typing her banking password on a laptop and then a room full of people in a room full of computers cheering and high-fiving each other.

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar

Framework has reportedly had a breach. Customer names, emails, and outstanding balances. https://community.frame.work/t/framework-data-breach/43408 #cybersecurity #laptops #hardware #breach #phishing

kyle, to security
@kyle@kylerank.in avatar

I'm pleased to see how Framework handled the issue of a consulting partner getting phished and sharing customer data with an attacker. The emails to customers seems prompt, it explains the situation clearly with transparent timelines, and provides clear and reasonable steps for their partners and their customers.

https://community.frame.work/t/framework-data-breach/43408

#framework #security #phishing

cR0w, to random

I can't believe that this is still a thing, but if your risk model is noticeably impacted by the adversarial capability of writing an email in the English language then I'm pretty sure your threat model is already broken.

https://www.nbcnews.com/tech/security/nsa-hacker-ai-bot-chat-chatgpt-bard-english-google-openai-rcna133086

InfobloxThreatIntel, to Cybersecurity

Hi. This is Renée, the head of Infoblox Threat Intel (@knitcode). Myself and a few of my researchers are sharing this Mastodon account. Our plan is to toot about suspicious and malicious activity in DNS. Our team tends to write very in-depth papers and want to use Mastodon to complement that with nuggets we've seen, updates on the DNS threat actors or TTPs we are seeing, and articles we are reading. Here goes!

knitcode, to Cybersecurity

Woot woot! My team is officially on Mastodon. We'll be posting on suspicious, malicious, and just plain curious things in DNS. Follow us @InfobloxThreatIntel !

Appreciate boosts for visibility.

JasonPerseus, to random
@JasonPerseus@mas.to avatar

Ah yes, let me just click this link and input my social secur-- HEY WAIT A SECOND!

Almost got me. (not).

#phishing

PogoWasRight, to random
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines