shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

249
active users

#socialengineering

1 post1 participant0 posts today
OTX Bot<p>Threat Actor Profile: Interlock Ransomware</p><p>Interlock, a relatively new ransomware group first observed in September 2024, has gained prominence in 2025 as an opportunistic ransomware operator. Unlike traditional Ransomware-as-a-Service models, Interlock operates without affiliates or public advertisements. The group conducts double extortion campaigns, leveraging compromised websites and multi-stage social engineering techniques to deliver payloads. Interlock's attack chain involves initial access through fake software updaters, execution of PowerShell scripts, and the use of custom remote access trojans. The group has targeted various sectors across North America and Europe, including education, healthcare, technology, and government entities. Notable attacks include the DaVita breach in April 2025 and the ransomware attack on the city of St. Paul, Minnesota in July 2025.</p><p>Pulse ID: 689f8d13d92fa7802f9dd44a<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/689f8d13d92fa7802f9dd44a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/689f8</span><span class="invisible">d13d92fa7802f9dd44a</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-08-15 19:40:03</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Education</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/Extortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Extortion</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/Healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Healthcare</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/NorthAmerica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthAmerica</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/RansomwareAsAService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomwareAsAService</span></a> <a href="https://social.raytec.co/tags/RemoteAccessTrojan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccessTrojan</span></a> <a href="https://social.raytec.co/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://social.raytec.co/tags/Trojan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trojan</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
earthling<p>Social Engineering Hacking Systems, Nations, and Societies by Michael Erbschloe, 2019, CRC </p><p>This book analyzes the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <br><a href="https://mastodon.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a></p>
Murilo<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@metacurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>metacurity</span></a></span> </p><p>A few years back while working in the office fitting business in Sydney, I would walk in and out of offices, as many times as needed. No questions asked — just because I was wearing a tradie t-shirt.</p><p>Sometimes the easiest way in is through the front door.👨🏻‍🔧🚨</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PhysicalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhysicalSecurity</span></a> <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a></p>
IT News<p>Google discovered a new scam—and also fell victim to it - In June, Google said it unearthed a campaign that was mass-c... - <a href="https://arstechnica.com/information-technology/2025/08/google-sales-data-breached-in-the-same-scam-it-discovered/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2025/08/google-sales-data-breached-in-the-same-scam-it-discovered/</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/salesforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>salesforce</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a></p>
Dissent Doe :cupofcoffee:<p>Insurance giant Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack:</p><p><a href="https://techcrunch.com/2025/07/26/allianz-life-says-majority-of-customers-personal-data-stolen-in-cyberattack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/26/alli</span><span class="invisible">anz-life-says-majority-of-customers-personal-data-stolen-in-cyberattack/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/thirdparty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thirdparty</span></a></p>
ReynardSec<p>8080 - a short story of 4-digit number and EU regulations in pratice 🇪🇺 </p><p>In Poland, the reporting mechanism via the short number 8080 enables rapid, citizen‑driven identification of smishing and cyber‑fraud attempts. Reporting a malicious message involves simply forwarding the suspicious SMS to 8080, which delivers it directly to CERT Polska for analysis [1].</p><p>Upon receipt and confirmation of malicious content, each new SMS pattern is published by CERT and within ~5 minutes, automatically fetched by all cooperating telecom providers, which then block any incoming messages matching it.</p><p>The entire system operates under the Act of 5 July 2018 on the National Cybersecurity System [2], which is the Polish implementation of the EU's NIS Directive [3] and tasks CERT with maintaining a registry of malicious SMS patterns and coordinating with telecom operators.</p><p>In 2024 alone, 746 new patterns were produced, blocking 1 475 366 fraudulent SMS before they reached users. Citizens filed 354 566 reports, of which 140 659 were classified as malicious [4].</p><p>It's difficult for me to assess whether these figures are high or low. The system may still lack sufficient patterns, and the number of blocked messages might be too small relative to the true scale of SMS communication and smishing threats... but hey, it's still better than nothing, isn't it?</p><p>Numbers are of course important, but what matters most to me is what I wrote in the second paragraph of this text. Large telecom companies with large legal departments have reached an understanding with a public entity (CERT Polska) and are actively cooperating for the benefit of citizens. That kind of public - private collaboration is very good, because it establishes a real pathway by which the numbers can grow in the future in a sustainable and enforceable way. This is pretty cool. </p><p>[1] <a href="https://cert.pl/baza-wiedzy/falszywe-smsy/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cert.pl/baza-wiedzy/falszywe-s</span><span class="invisible">msy/</span></a><br>[2] <a href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001560" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">isap.sejm.gov.pl/isap.nsf/DocD</span><span class="invisible">etails.xsp?id=WDU20180001560</span></a> <br>[3] <a href="https://eur-lex.europa.eu/eli/dir/2016/1148/oj/eng" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eur-lex.europa.eu/eli/dir/2016</span><span class="invisible">/1148/oj/eng</span></a> <br>[4] <a href="https://cert.pl/uploads/docs/Raport_CP_2024.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cert.pl/uploads/docs/Raport_CP</span><span class="invisible">_2024.pdf</span></a> </p><p><a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/nationalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nationalsecurity</span></a> <a href="https://infosec.exchange/tags/cert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cert</span></a> <a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
Jerry on Mastodon<p>Seriously? WTF?</p><p>“Cognizant was not duped by any elaborate ploy or sophisticated hacking techniques,” according to a copy of the lawsuit reviewed by Reuters. “The cybercriminal just called the Cognizant Service Desk, asked for credentials to access Clorox’s network, and Cognizant handed the credentials right over.”</p><p><a href="https://www.nbcnews.com/business/business-news/lawsuit-says-clorox-hackers-got-passwords-simply-asking-rcna220313" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nbcnews.com/business/business-</span><span class="invisible">news/lawsuit-says-clorox-hackers-got-passwords-simply-asking-rcna220313</span></a></p><p><a href="https://hear-me.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://hear-me.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://hear-me.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://hear-me.social/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a></p>
IT News<p>Hacking When It Counts: DIY Prosthetics and the Prison Camp Lathe - There are a lot of benefits to writing for Hackaday, but hands down one of the bes... - <a href="https://hackaday.com/2025/07/14/hacking-when-it-counts-diy-prosthetics-and-the-prison-camp-lathe/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/14/hackin</span><span class="invisible">g-when-it-counts-diy-prosthetics-and-the-prison-camp-lathe/</span></a> <a href="https://schleuss.online/tags/hackingwhenitcounts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingwhenitcounts</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/civilengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>civilengineering</span></a> <a href="https://schleuss.online/tags/machinetools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>machinetools</span></a> <a href="https://schleuss.online/tags/engineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineering</span></a> <a href="https://schleuss.online/tags/prosthetic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prosthetic</span></a> <a href="https://schleuss.online/tags/featured" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>featured</span></a> <a href="https://schleuss.online/tags/interest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interest</span></a> <a href="https://schleuss.online/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a> <a href="https://schleuss.online/tags/prison" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prison</span></a> <a href="https://schleuss.online/tags/lathe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lathe</span></a> <a href="https://schleuss.online/tags/limb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>limb</span></a> <a href="https://schleuss.online/tags/wwii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wwii</span></a> <a href="https://schleuss.online/tags/pow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pow</span></a></p>
gillo<p>Nobody is immune to deepfakes, and definitely not the current US administration <a href="https://www.theguardian.com/us-news/2025/jul/08/marco-rubio-ai-impostor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theguardian.com/us-news/2025/j</span><span class="invisible">ul/08/marco-rubio-ai-impostor</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/deepfakes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deepfakes</span></a> <a href="https://infosec.exchange/tags/marcorubio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>marcorubio</span></a> <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a></p>
january1073<p>Check it out , try it - ethically! -, and if you like it, leave a star. And if you feel brave enough ... 🦖 ... fork &amp; contribute.<br><a href="https://medium.com/bugbountywriteup/darkmailr-generate-realistic-context-aware-phishing-emails-air-gapped-d3cc88457dab" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/bugbountywriteup/da</span><span class="invisible">rkmailr-generate-realistic-context-aware-phishing-emails-air-gapped-d3cc88457dab</span></a><br>Made with 🫶 for the cybersecurity community.<br><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/Ollama" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ollama</span></a> <a href="https://infosec.exchange/tags/Flask" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flask</span></a> <a href="https://infosec.exchange/tags/OSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSS</span></a></p>
ChiefGyk3D<p>They said it was just a quote—turned into a 3-hour pressure trap. Roofing, windows, gutters… this wasn’t a pitch, it was social engineering.</p><p>Watch now: <a href="https://youtu.be/Z8uC8LzV-O4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/Z8uC8LzV-O4</span><span class="invisible"></span></a><br><a href="https://social.chiefgyk3d.com/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://social.chiefgyk3d.com/tags/HomeImprovementScam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeImprovementScam</span></a> <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
Chris Wolff :NeonNOU:<p>UPDATE, 2025-06-30: the jacket has been ordered from Amazon; more updates to follow.</p><p>I am NOT going to be impersonating anyone; please read the entire thing.</p><p>Social engineering experiment incoming: <a href="https://www.amazon.com/dp/B017V70AG8/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">amazon.com/dp/B017V70AG8/</span><span class="invisible"></span></a></p><p>That thing looks close enough to an official FBI jacket that it could be made to pass for one: <a href="https://www.fedsapparel.com/collections/federal-bureau-of-investigations/products/fbi-agency-identifier-jacket" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fedsapparel.com/collections/fe</span><span class="invisible">deral-bureau-of-investigations/products/fbi-agency-identifier-jacket</span></a></p><p>So here's the experiment… I get that jacket, which says nothing, and I take it to a T shirt shop and have them print in the exact same font (or close enough), yellow in all caps, across the back and on the left side of the chest…</p><p>LOL</p><p>Really curious how people are gonna react.</p><p><a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a></p>
The DefendOps Diaries<p>Scattered Spider hackers are now targeting aviation and transport by posing as trusted insiders—imagine getting a call from "IT support" that isn’t really IT support. How deep does their deception go?</p><p><a href="https://thedefendopsdiaries.com/scattered-spider-hackers-shift-focus-to-aviation-and-transportation-firms/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/scatte</span><span class="invisible">red-spider-hackers-shift-focus-to-aviation-and-transportation-firms/</span></a></p><p><a href="https://infosec.exchange/tags/scatteredspider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scatteredspider</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a><br><a href="https://infosec.exchange/tags/aviationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aviationsecurity</span></a><br><a href="https://infosec.exchange/tags/transportationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transportationsecurity</span></a></p>
Healthcare Privacy & HIPAA Bot<p>DATE: June 25, 2025 at 03:43PM<br>SOURCE: HIPAA Watch from JD Supra</p><p>Direct article link at end of text block below.</p><p>Court Vacates HIPAA Reproductive Information Privacy Regulations <a href="https://t.co/6LvusB0Y6E" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/6LvusB0Y6E</span><span class="invisible"></span></a></p><p>Here are any URLs found in the article text: </p><p><a href="https://t.co/6LvusB0Y6E" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/6LvusB0Y6E</span><span class="invisible"></span></a></p><p>Articles can be found by scrolling down the page at <a href="https://www.jdsupra.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">jdsupra.com/</span><span class="invisible"></span></a> under the title "Latest Updates". </p><p>-------------------------------------------------</p><p>Private, vetted email list for mental health professionals: <a href="https://www.clinicians-exchange.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">clinicians-exchange.org</span><span class="invisible"></span></a></p><p>Most healthcare security and privacy posts related to IT or infosec are at <span class="h-card" translate="no"><a href="https://mastodon.clinicians-exchange.org/@rsstosecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rsstosecurity</span></a></span></p><p>-------------------------------------------------</p><p><a href="https://mastodon.clinicians-exchange.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/doctors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doctors</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/securitynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitynews</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapist</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/mentalhealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mentalhealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychiatry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychiatry</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/hospital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hospital</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialwork</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/HIPAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HIPAA</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcaresecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/BAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BAA</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/patientrecords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patientrecords</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/telehealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telehealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a></p>
SpaceLifeForm<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@PogoWasRight" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>PogoWasRight</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@lawrenceabrams" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lawrenceabrams</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@zackwhittaker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zackwhittaker</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span> </p><p>That is the beauty of the beast.</p><p>There does not have to be an actual breach to offer free credit monitoring. As a side effect, In the meantime, they collect updated PII.</p><p><a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a></p>
OWASP Ottawa<p>📢 OWASP Ottawa June 2025 Meetup 📢</p><p>Join us in person at the University of Ottawa for our next OWASP Ottawa meetup on June 18, 2025, as we explore the human side of cybersecurity.</p><p>📅 Date: June 18, 2025<br>⏰ Time: 6:00 PM EST – Arrival, setup &amp; pizza 🍕<br> 6:30 PM EST – Technical Talks<br>📍 Location: 150 Louis-Pasteur Private, University of Ottawa, Room 117<br>🎙️ Talk: “Hacking the Human Firewall: Insights from Social Engineering Corporations”<br> 👥 Speakers: Kyle Falcon, PhD, Ahmed Shah, Mathieu Quirion, and Kevin Tremblay – Security &amp; GRC Analysts at Malleum</p><p>Despite all the advanced tech, humans remain the weakest link in cybersecurity. This talk will dive into real-world social engineering campaigns and will discuss:<br> <br>• OSINT - Determining Targets and Entry Points<br>• NIST Phish Scale - Evaluating the Content of a Phishing Email<br>• Email Phishing - How Attackers Get SPAM Into the Corporate Inbox<br>• Phone Social Engineering - Experiences in Impersonation and Taking Over Accounts<br>• Physical Security - Outcomes from Just Hanging Around the Office</p><p>You'll leave with:<br>• A deeper understanding of attacker psychology &amp; methods<br>• Practical tips to strengthen your organization’s human defenses</p><p>📺 Can’t join in person? We’ll livestream on YouTube: <a href="https://www.youtube.com/@OWASP_Ottawa" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/@OWASP_Ottawa</span><span class="invisible"></span></a></p><p>🔗 RSVP now: <a href="https://www.meetup.com/owasp-ottawa/events/308219237/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">meetup.com/owasp-ottawa/events</span><span class="invisible">/308219237/</span></a></p><p>Come learn, network, and grab some pizza 🍕 with Ottawa’s cybersecurity community!</p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/Ottawa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ottawa</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a></p>
Pyrzout :vm:<p>How CISOs can defend against Scattered Spider ransomware attacks – Source: www.csoonline.com <a href="https://ciso2ciso.com/how-cisos-can-defend-against-scattered-spider-ransomware-attacks-source-www-csoonline-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/how-cisos-can-de</span><span class="invisible">fend-against-scattered-spider-ransomware-attacks-source-www-csoonline-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityPractices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityPractices</span></a> <a href="https://social.skynetcloud.site/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/CSOonline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSOonline</span></a> <a href="https://social.skynetcloud.site/tags/CSOOnline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSOOnline</span></a></p>
Alex Jimenez<p>FBI warns of Luna Moth extortion attacks targeting law firms</p><p>The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting US law firms over the last two years in callback <a href="https://mas.to/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> and <a href="https://mas.to/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fbi-warns-of-luna-moth-extortion-attacks-targeting-law-firms/</span></a></p><p><a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Threat Insight<p>State-sponsored threat actors often leverage techniques first developed and deployed by cybercriminal actors. One example is <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a>, a highly effective technique that involves clever <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a>.</p><p>Listen as Proofpoint threat research experts Selena Larson, Sarah Sabotka, and Saher Naumaan deep dive into how modern <a href="https://infosec.exchange/tags/espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>espionage</span></a> and <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> are increasingly blurring lines.</p><p>Stream DISCARDED now:<br>Apple Podcasts: <a href="https://brnw.ch/21wSNbM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbM</span><span class="invisible"></span></a><br>Spotify: <a href="https://brnw.ch/21wSNbL" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbL</span><span class="invisible"></span></a><br>Web player: <a href="https://brnw.ch/21wSNbN" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbN</span><span class="invisible"></span></a></p>
TheJen will not comply<p>Now that I keep a pot of tea full on the samovar at all times, the hubs has started drinking it too. </p><p>Which was my goal. :)</p><p><a href="https://beige.party/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a></p>