shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

281
active users

#threatintel

6 posts6 participants0 posts today

We've talked before about abuse issues with .top domains, and sadly, things aren’t getting better. In fact, we’re now seeing a rise in "toll scams" you might have spotted hitting the headlines in recent weeks. 📈🗞️

But, why is this happening? What do we actually know about .🔝? And more importantly, what can be done to stop it? ✋

Learn more in the latest Domain Reputation Spotlight 🔦 ⤵️
spamhaus.org/resource-hub/serv

⚠️ App security alert: TM SGNL — a custom Signal fork used by high-level U.S. officials — was reportedly hacked 📱🔓

Key findings via researchers:
🛠️ Hardcoded credentials found in the app’s source code
📥 Hacker claims to have breached TeleMessage (creator of TM SGNL) in minutes
📁 Archive server may store unencrypted copies of sensitive messages
📇 Leaked data includes government contacts, messages, and backend access

🚨 Why it matters:
🔐 TM SGNL modifies Signal to support message archiving — possibly before encryption
⚠️ That’s a potential plaintext vulnerability — even if E2EE is in place
💬 Raises urgent questions about how U.S. officials handle sensitive digital comms

🛡️ Security leaders should:
📱 Vet third-party forks of secure messaging apps rigorously
🚫 Avoid using unofficial tools for sensitive communication
🧾 Align secure messaging practices with compliance and cybersecurity

This incident isn’t just a breach — it’s a wake-up call about assuming encryption = security.

#CyberSecurity #MessagingApps #Signal #DataBreach #GovernmentSecurity #ThreatIntel #security #privacy #cloud #infosec

csoonline.com/article/3977385/

CSO Online · Company behind modified Signal app used by Mike Waltz allegedly hackedBy John E. Dunn

The #cybersecurity firm Binary Defense has an informative blog out on one of the FakeCAPTCHA / ClickFix campaigns. What's most useful is they link to their Github repo where they published detections for Defender for Endpoint, Crowdstrike and SentinelOne.
#threatintel #detectionengineering

binarydefense.com/resources/bl

Binary Defense · Analyzing LummaStealer’s FakeCAPTCHA Delivery Tactics | Binary DefensePaste, Click, Compromised

Worth a listen: This Week in Machine Learning podcast’s most recent episode is on CTIBench, a benchmark framework for LLMs in cyber threat intelligence. Interesting conversation, have not dived into the paper yet.

twimlai.com/podcast/twimlai/ct

arxiv.org/abs/2406.07599

TWIML · CTIBench: Evaluating LLMs in Cyber Threat Intelligence with Nidhi Rastogi | The TWIML AI Podcast
Continued thread

One of M&S’ biggest suppliers have said they have reverted to pen and paper for orders due to M&S lacking IT.

Additionally, M&S staff are raising concern about how they will be paid due to lack of IT systems.

M&S are over a week into a ransomware incident and still don’t have their online store working.

bbc.com/news/articles/cvgnyplv

People walking past a Marks & Spencer store
www.bbc.comM&S supplier back to pen and paper after cyber attackWhat's going on behind the scenes in the aftermath of the cyber attack on M&S.