linuxmagazine, to linux
@linuxmagazine@fosstodon.org avatar

A group of bad actors responsible for the Akira ransomware are now targeting Linux servers
https://www.linux-magazine.com/Online/News/Linux-Servers-Targeted-by-Akira-Ransomware

publicvoit, to random
@publicvoit@graz.social avatar

There was this (blog?) article recently where a security expert analyzed the legit emails of a company (some parcel delivery service?) and found lots of #phishing clues which renders typical "how to spot phishing/scam emails" into useless tips.

Unfortunately, I didn't write down that URL. Can somebody help me here?

It might have even been in German, I don't know any more.

brennansv, (edited ) to security
@brennansv@sfba.social avatar

Target.com is a security risk. Someone used my email to create an account so I got emails about it. I suspect if I ever use my email with Target this other person could remain signed in and abuse this access. It did not confirm the email when the account was created and once I reset the password I could not delete the account. I reached out to Abuse@target.com and the reply directed me to a form which requires me to give up a lot of personal details. I am not going to to do that. So I reported an incident to CISA instead. Target should be doing better than this, especially in 2024. #security #phishing #target

https://www.target.com/guest-privacy/privacy-intake-form

https://www.cisa.gov/forms/report

kubikpixel, to random German
@kubikpixel@chaos.social avatar

Ich hoffe, das Passkeys diesbezüglich nicht betroffen ist so wie Passwort-Manager wie @keepassxc, @bitwarden inklusive 2FA schon einen grösseren Schutz gegenüber der KI ergibt.

»GPT-4 kann eigenständig bekannte Sicherheitslücken ausnutzen:
Forscher haben festgestellt, dass GPT-4 allein anhand der zugehörigen Schwachstellenbeschreibungen 13 von 15 Sicherheitslücken erfolgreich ausnutzen kann.«

🤖 https://www.golem.de/news/mit-cve-beschreibung-gpt-4-kann-eigenstaendig-bekannte-sicherheitsluecken-ausnutzen-2404-184301.html


#passkey #passwort #hack #ki #gpt4 #2fa #itsicherheit #sicherheitslucken

kubikpixel,
@kubikpixel@chaos.social avatar

🧵 …und nicht nur die vorhin erwähnten Tools nützen als Schutz diesbezüglich, sondern auch das nicht herein fallen gegenüber den "helfende Profis":

[ENG]
«LastPass users targeted in phishing attacks good enough to trick even the savvy:
Campaign used email, SMS, and voice calls to trick targets into divulging master passwords.»

🔓 https://arstechnica.com/security/2024/04/lastpass-users-targeted-in-phishing-attacks-good-enough-to-trick-even-the-savvy/


tomkalei, to random German
@tomkalei@machteburch.social avatar

Ich habe kürzlich zum ersten Mal in meinem Leben bei einem Phishing Angriff Geld verloren und das ging so wie hier im langen 🧵 erzählt.

77nn, to random Italian
@77nn@goto.77nn.it avatar

I messaggi quelli seri.

r1ckym3,
@r1ckym3@mastodon.uno avatar

@77nn 😄 ma cos’è oggi il day? Anche altri utenti oggi hanno ricevuto messaggi esilaranti come questo

lau, to Belgium French
@lau@eldritch.cafe avatar

Je viens de recevoir un appel d'un numéro belge, une voix robotique s'annonce comme étant PayPal et m'informant que je viens de faire une transaction de 582€.
J'ai raccroché direct, signalé et bloqué le numéro.

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

37 arrested as police smash LabHost international fraud network.

Read more in my article on the Tripwire blog: https://www.tripwire.com/state-of-security/37-arrested-police-smash-labhost-international-fraud-network

#cybersecurity #cybercrime #phishing

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Seems to me that a new role has emerged for those who want a career in cybersecurity: Cybercriminal Troll.

Police around the world are making videos to scare the bejeezus out of scammers and hackers, revealing in a jaunty way how they are about to be busted.

Nice one Met Police.

Met Police video

davemark, to security
@davemark@mastodon.social avatar

"Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers"

😮

The simpleminded change from the text "X.com" to read "twitter.com" led to embedded URLs being changed from, say, "fedX.com" to "fed...twitter.com" (the ellipsis is mine).

Phishing schemes abound. 🙄

https://krebsonsecurity.com/2024/04/twitters-clumsy-pivot-to-x-com-is-a-gift-to-phishers/
#X

aeveltstra, to cisco
@aeveltstra@mastodon.social avatar
redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
stux, to Discord
@stux@mstdn.social avatar

A New Kind of Phishing Attack - by @endingwithali

#Phishing #ThreatWire #Discord #Latrodectus

https://www.youtube.com/watch?v=3DxMHGRKJNs

mattotcha, to twitter
@mattotcha@mastodon.social avatar
ellouis, to random French
@ellouis@mastodon.ellouisdocker.synology.me avatar

Qui est l'idiot qui vient de cliquer le lien dans un mail de relance Pole Emploi et de saisir son mot de passe malgré l'URL suspecte?
C'est moiiiiiiiii!

Je me suis reconnecté en passant par le vrai site et j'ai modifié mon mot de passe.
J'espère que les malandrins n'ont pas eu le temps de récupérer mes infos.

J'ai appris ma leçon : ne jamais cliquer un lien avant le premier café.

ellouis,
@ellouis@mastodon.ellouisdocker.synology.me avatar
TalosSecurity, to random
@TalosSecurity@mstdn.social avatar

This morning, we published new research into , a newly discovered threat actor who is targeting human rights activists in North Africa. Learn more about their campaigns and fake apps here https://blog.talosintelligence.com/starry-addax/

chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Conventional Email security tools are far from enough these days, You need to attach some sort of AI/ML processing. I know I personally am targeted with very specific and curated phishing attempts as a content creator several times a month. Avanan so far has caught the majority of these to the tune of 95+% accuracy.

#Infosec #Cybersecurity #Email #Phishing

afterdawn, to random Finnish
@afterdawn@mementomori.social avatar

Tänään aukesi valtion ylläpitämä vapaaehtoisen luottokiellon rekisteri.

Teimme sen käytöstä pienen oppaan, samalla kertoen mistä oikein on kyse.

Suosittelemme todella vahvasti, että tätä haetaan vähänkään digitaidoista epävarmemmille vanhemmille sukulaisille.

Ja tietysti myös, jos vähääkään epäilet, että olet joutunut identiteettivarkauden uhriksi.

https://dawn.fi/uutiset/2024/04/01/vapaaehtoinen-luottokielto-opas

weddige, to random
@weddige@gruene.social avatar

Welcome to another edition of "Is this phishing?"

Assume the email is in principle plausible and the transaction ID exists. What is the worst that can happen if you press send?

#phishing

weddige,
@weddige@gruene.social avatar

This is due to something I call #KoboldLetters. By cleverly (mis)using CSS, attackers can display completely different emails to different recipients.

The problems with HTML and CSS in emails have been known for a long time, but the security implications have usually been underestimated or actively downplayed. That's why I wrote an article explaining how HTML emails can be used to deceive recipients into becoming part of an sophisticated #phishing attack.

https://lutrasecurity.com/en/articles/kobold-letters/

ErikJonker, to random
@ErikJonker@mastodon.social avatar

Eerlijk gezegd vond ik dit bericht geen nieuws cq niet bijzonder. Ik ga er vanuit dat mijn emailadres op phishing en spamlijsten staat helaas. Met Gmail heb ik er overigens verrassend weinig last van. Maar een extra waarschuwing voor phishing is natuurlijk altijd goed.
https://nos.nl/artikel/2514498-vijf-miljoen-nederlandse-e-mailadressen-op-lijsten-cybercriminelen
#cybercime #phishing

afewbugs, to random
@afewbugs@social.coop avatar

The #CooperativeBank is currently running a terrible promotion where you get an email from the bank directing you to a form where you enter your card details for a chance to win a cash prize (https://www.visa.co.uk/campaign/co-operativebank/win-little-help-a-lot/) And as far as I can tell this is all actually completely legit, but this really isn't the sort of behaviour the bank should be encouraging its customers to engage in!

#Phishing #Fraud

phishing_radar, to random German
@phishing_radar@verbraucherzentrale.social avatar

#Phishing aktuell: Bestätigung der Telefonnummer gefordert im Namen der #Targobank: https://www.verbraucherzentrale.nrw/phishing

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • InstantRegret
  • magazineikmin
  • modclub
  • khanakhh
  • Youngstown
  • rosin
  • mdbf
  • slotface
  • Durango
  • ngwrru68w68
  • thenastyranch
  • kavyap
  • DreamBathrooms
  • JUstTest
  • cubers
  • osvaldo12
  • Leos
  • anitta
  • everett
  • ethstaker
  • GTA5RPClips
  • tester
  • cisconetworking
  • megavids
  • tacticalgear
  • normalnudes
  • lostlight
  • All magazines