shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

285
active users

#cybersecurity

175 posts134 participants1 post today
Hourly Jobs | TotalCyber.io<p>🚀 Offensive Cybersecurity Penetration&nbsp;Tester<br>🏢 Microsoft<br>📍 Washington, United States</p><p>🔗 Apply now: <a href="https://totalcyber.io/jobs/microsoft/offensive-cybersecurity-penetration-tester" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">totalcyber.io/jobs/microsoft/o</span><span class="invisible">ffensive-cybersecurity-penetration-tester</span></a></p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>job</span></a> <a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a> <a href="https://infosec.exchange/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://infosec.exchange/tags/fedijobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedijobs</span></a> <a href="https://infosec.exchange/tags/getfedhired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedhired</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a> <a href="https://infosec.exchange/tags/gethired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gethired</span></a> <a href="https://infosec.exchange/tags/joboffer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>joboffer</span></a> <a href="https://infosec.exchange/tags/flossjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flossjobs</span></a> <a href="https://infosec.exchange/tags/jobhunt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobhunt</span></a></p>
ChiefGyk3D<p>🚨 SignalGate returns — and this time, it includes family members and war plans in a group chat. New video drops 5PM EST tomorrow on YouTube. Encryption ≠ accountability, and this one's a mess.</p><p><a href="https://social.chiefgyk3d.com/tags/SignalGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SignalGate</span></a> <a href="https://social.chiefgyk3d.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://social.chiefgyk3d.com/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://social.chiefgyk3d.com/tags/OPSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPSEC</span></a> <a href="https://social.chiefgyk3d.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google’s systems, passing all verifications but pointing to a fraudulent page that collected logins. <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/</span></a></p>
BreakingBadness<p>How do you identify a cybersecurity incident? </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@hacks4pancakes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hacks4pancakes</span></a></span> sees a lot of copy/paste incident responses on the Internet - you really need to understand what matters to your business. Sarah Sabotka argues that this is where CTI comes in to support incident response to see what we can enrich. Per@DavidJBianco, the Identify stage is all about going from raw data up and to engaging your incident response plan. </p><p>Catch the full discussion from this past week's episode of the Breaking Badness Cybersecurity Podcast here: <a href="https://podcasts.apple.com/us/podcast/dfirside-chat-lessons-from-the-frontlines-of/id1456143419?i=1000703745188" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">podcasts.apple.com/us/podcast/</span><span class="invisible">dfirside-chat-lessons-from-the-frontlines-of/id1456143419?i=1000703745188</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Hold your phone near your card... and they drain your bank account.</p><p>A new Android malware-as-a-service, SuperCard X, is targeting Italians with NFC relay attacks—letting cybercriminals remotely steal card data and pull off ATM &amp; PoS fraud.<br><a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <br><a href="https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/supe</span><span class="invisible">rcard-x-android-malware-enables.html</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Experts report that a new social engineering technique is using ClickFix Captcha to deliver malware like Quakbot, effectively bypassing traditional security measures and posing a significant threat. <a href="https://kolektiva.social/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://darkatlas.io/blog/delivering-trojans-via-clickfix-captcha" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">darkatlas.io/blog/delivering-t</span><span class="invisible">rojans-via-clickfix-captcha</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Cybersecurity experts report that FOG ransomware is being spread by cybercriminals falsely claiming connections to DOGE, as detailed in their investigation of malware samples containing this payload. <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://www.trendmicro.com/en_us/research/25/d/fog-ransomware-concealed-within-binary-loaders-linking-themselve.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">25/d/fog-ransomware-concealed-within-binary-loaders-linking-themselve.html</span></a></p>
ApplSec<p>🧪 NEW BETA RELEASES 🧪</p><p>📱 iOS 18.5 beta 3 (22F5053j)<br>📱 iPadOS 18.5 beta 3 (22F5053j)<br>💻 macOS 15.5 beta 3 (24F5053j)<br>📺 tvOS 18.5 beta 3 (22L5559d)<br>🥽 visionOS 2.5 beta 3 (22O5459c)<br>⌚ watchOS 11.5 beta 3 (22T5559d)</p><p><a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a></p>
Alex Jimenez<p>Bad bots are taking over the web. Banks are their top target</p><p>About 40% of bot attacks on APIs in 2024 were directed at the financial sector, according to the 2025 Bad Bot Report from Imperva</p><p><a href="https://www.americanbanker.com/news/bad-bots-are-taking-over-the-web-banks-are-their-top-target" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">americanbanker.com/news/bad-bo</span><span class="invisible">ts-are-taking-over-the-web-banks-are-their-top-target</span></a></p><p><a href="https://mas.to/tags/FinTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FinTech</span></a> <a href="https://mas.to/tags/FinServ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FinServ</span></a> <a href="https://mas.to/tags/Banking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Banking</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
urlDNA.io :verified:<p>Possible Phishing 🎣<br> on: ⚠️hxxps[:]//kucoinsigjlogin[.]webflow[.]io<br> 🧬 Analysis at: <a href="https://urldna.io/scan/680531db3b7750000adb7c1f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">urldna.io/scan/680531db3b77500</span><span class="invisible">00adb7c1f</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/urldna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>urldna</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Efani<p>🚨 A new Android malware campaign is using NFC relay attacks to clone credit cards — and it’s nearly invisible to antivirus tools.</p><p>Security researchers have discovered 'SuperCard X', a malware-as-a-service (MaaS) platform that allows cybercriminals to steal card data and make contactless payments using compromised Android devices.</p><p>Key highlights from the report:<br>- Distributed via social engineering scams through fake SMS or WhatsApp messages <br>- Victims are tricked into installing a malicious app disguised as a bank “verification” tool <br>- Once installed, it uses NFC to read card chip data and sends it to a second attacker device <br>- Attackers use a companion app to emulate the victim’s card and make payments or ATM withdrawals</p><p>🔍 What makes it dangerous:<br>- SuperCard X requests minimal permissions, making it hard to detect <br>- It uses ATR-based card emulation and mutual TLS (mTLS) for secure communication <br>- Malware is not flagged by any antivirus engines on VirusTotal <br>- Transactions are small, instant, and look legitimate to banks — making them harder to detect or reverse</p><p>🛡️ Google responded saying Play Protect is active and currently no such apps are listed on Google Play. But since these apps spread outside the store, Android users remain at risk — especially if they sideload apps or fall for impersonation scams.</p><p>This is a textbook example of how mobile payment infrastructure is being exploited — and why NFC security deserves more attention in mobile-first threat models.</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span> we’re committed to helping protect high-risk users from silent, evasive mobile threats just like this.</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AndroidMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AndroidMalware</span></a> <a href="https://infosec.exchange/tags/NFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFC</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/EfaniSecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EfaniSecure</span></a> <a href="https://infosec.exchange/tags/SuperCardX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SuperCardX</span></a> <a href="https://infosec.exchange/tags/FintechFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FintechFraud</span></a> <a href="https://infosec.exchange/tags/MalwareAsAService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAsAService</span></a></p>
AAKL<p>"Researchers also discovered troubling instances where Claude expressed values contrary to its training."</p><p>"These anomalies included expressions of 'dominance' and 'amorality' — values Anthropic explicitly aims to avoid in Claude’s design. The researchers believe these cases resulted from users employing specialized techniques to bypass Claude’s safety guardrails."</p><p>Anthropic study: Discovering and Analyzing Values in Real-World <a href="https://assets.anthropic.com/m/18d20cca3cde3503/original/Values-in-the-Wild-Paper.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">assets.anthropic.com/m/18d20cc</span><span class="invisible">a3cde3503/original/Values-in-the-Wild-Paper.pdf</span></a> </p><p>More:</p><p>VentureBeat: Anthropic's research reveals both reassuring alignment with the company’s goals and concerning edge cases that could help identify vulnerabilities in AI safety measures <a href="https://venturebeat.com/ai/anthropic-just-analyzed-700000-claude-conversations-and-found-its-ai-has-a-moral-code-of-its-own/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">venturebeat.com/ai/anthropic-j</span><span class="invisible">ust-analyzed-700000-claude-conversations-and-found-its-ai-has-a-moral-code-of-its-own/</span></a> <span class="h-card" translate="no"><a href="https://flipboard.com/@venturebeat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>venturebeat</span></a></span> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
ChiefGyk3D<p>Just recorded vids on Signalgate 3.0 and the 4chan hack. Starting with Signalgate—yes, 3.0. The misuse started in Trump’s first term. He was sued for it. I broke it down in my last YouTube deep dive: <a href="https://youtu.be/e7b5_OKn7XE" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/e7b5_OKn7XE</span><span class="invisible"></span></a><br><a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://social.chiefgyk3d.com/tags/Signalgate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signalgate</span></a></p>
Brian Clark<p>Text message received via email-to-text gateway directing me to reply via WhatsApp. Nothing suspicious there at all 😉</p><p>From:<br>troy.williams9864[@]deliverydaily[.]org</p><p>WhatsApp number referenced:<br>+1971899[4575]</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/smishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smishing</span></a></p>
Nonilex<p>Govt ofvls under <a href="https://masto.ai/tags/Biden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biden</span></a> &amp; <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> improperly shared sensitive documents w/thousands of federal workers, including potentially <a href="https://masto.ai/tags/classified" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>classified</span></a> floor plans of the <a href="https://masto.ai/tags/WhiteHouse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhiteHouse</span></a>, acc/to internal records reviewed by WaPo.<br>
Career employees at the <a href="https://masto.ai/tags/GSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GSA</span></a>, which provides administrative &amp; tech support for much of the federal bureaucracy &amp; manages the govt’s real estate portfolio, were responsible for the oversharing, which spurred a <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> incident report &amp; investigation last week.</p><p><a href="https://masto.ai/tags/NationalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationalSecurity</span></a></p>
Brian Clark<p>I've shared content from these accounts before, but I thought it would be good to put all of them in one place. If you want to stay up to date on <a href="https://infosec.exchange/tags/IOCs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOCs</span></a> from different kinds of botnets and C2 infrastructure, follow these accounts. </p><p><span class="h-card" translate="no"><a href="https://ioc.exchange/@SarlackLab" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SarlackLab</span></a></span><br><span class="h-card" translate="no"><a href="https://infosec.exchange/@monitorsg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>monitorsg</span></a></span><br><span class="h-card" translate="no"><a href="https://infosec.exchange/@ScumBots" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ScumBots</span></a></span></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Brian Clark<p>Google Mandiant released a report on April 7 that documents a new-to-them type of RDP-based attack -- but not the type of RDP attack you are thinking of. In this case, they aren't brute forcing RDP servers open to the Internet, they are emailing people RDP files that, when opened, connect them to a remote RDP App server. Once connected, the RDP connection automatically maps their local file system and clipboard to the RDP App server. From there they can exfiltrate data the user has access to. </p><p>It's a clever attack but can be mitigated by blocking .rdp files from being emailed to your users. If you aren't already doing this, I highly suggest you do so. Receiving RDP files from randos on the Internet should not be a thing that is allowed. Other detection and prevention opportunities are detailed in the article. </p><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/windows-rogue-remote-desktop-protocol/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cloud.google.com/blog/topics/t</span><span class="invisible">hreat-intelligence/windows-rogue-remote-desktop-protocol/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
The Japan Times<p>Asian crime syndicates behind the multibillion-dollar cyberscam industry are expanding globally as raids in Southeast Asia fail to contain their activities, the United Nations said in a report on Monday. <a href="https://www.japantimes.co.jp/news/2025/04/21/asia-pacific/crime-legal/cyberscam-industry-spread-un/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/news/2025/04/</span><span class="invisible">21/asia-pacific/crime-legal/cyberscam-industry-spread-un/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/asiapacific" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>asiapacific</span></a> <a href="https://mastodon.social/tags/crimelegal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crimelegal</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/southeastasia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>southeastasia</span></a> <a href="https://mastodon.social/tags/china" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>china</span></a> <a href="https://mastodon.social/tags/thailand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thailand</span></a> <a href="https://mastodon.social/tags/myanmar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>myanmar</span></a> <a href="https://mastodon.social/tags/organizedcrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>organizedcrime</span></a> <a href="https://mastodon.social/tags/cambodia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cambodia</span></a></p>
shellsharks<p><strong>Mentorship Monday - Discussions for career and learning!</strong></p> <p><a href="https://infosec.pub/post/27012668" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosec.pub/post/27012668</span><span class="invisible"></span></a></p>
OTX Bot<p>The "free money" trap: How scammers exploit financial anxiety</p><p>This analysis explores how scammers capitalize on financial stress by promising 'free money' through fake subsidy programs, government grants, or relief cards. Common tactics include using urgency, exclusivity, and fabricated social proof to manipulate victims. Scammers employ various techniques such as phishing, impersonation, fake customer support, QR code scams, and malware-laden attachments to collect personal data for identity theft or future scams. The article provides red flags to watch for, including vague claims, lack of contact information, and unrealistic promises. To protect against these scams, individuals should verify sources, avoid sharing personal information on unverified websites, report suspicious sites, and educate others about these fraudulent schemes.</p><p>Pulse ID: 6802cb9dcd152b0f855adc5b<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/6802cb9dcd152b0f855adc5b" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/6802c</span><span class="invisible">b9dcd152b0f855adc5b</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-18 22:01:01</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>