socel.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Socel is a place for animation professionals, freelancers, independents, students, and fans to connect and grow together. Everyone in related fields are also welcome.

Server stats:

328
active users

#phishing

20 posts19 participants0 posts today
Steve's Place<p>This text from a stranger... Oh, wow! Enforcement action will be taken! It is my final notice! I must pay my tolls, scofflaw that I am! The stranger has provided a handy link to use to stop enforcement action by paying what I owe now, before it's too late!</p><p>Except.. dudes and/or dudettes... I don't own a car.</p><p>It's time to do the fuck-off dance! 🕺 🖕 💃 </p><p><a href="https://mastodon.stevesworld.co/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.stevesworld.co/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.stevesworld.co/tags/texts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>texts</span></a></p>
René<p>It can be easy to fall for a phishing scam. Your best bet is to throw your phone away and go live in the woods. </p><p><a href="https://fosstodon.org/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://fosstodon.org/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a></p>
Dave Rahardja<p>Interesting phishing attempt. They take your name and some address associated with it, and send you a message like this.</p><p>PS: You can’t win even if you reply, because saying “no thanks” will confirm that you live at the address they gave.</p><p>PPS: Nobody who knows me personally calls me “David”. This guy probably got my name from some stolen mailing list.</p><p><a href="https://sfba.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://sfba.social/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://sfba.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://sfba.social/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a></p>
AAKL<p>ESET: Catching a phish with many faces <a href="https://www.welivesecurity.com/en/scams/spotting-phish-many-faces/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/scams/sp</span><span class="invisible">otting-phish-many-faces/</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@ESETresearch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ESETresearch</span></a></span> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
usd AG<p>We have found an interesting vulnerability in a <a href="https://infosec.exchange/tags/Matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matrix</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> client:</p><p>🧩 Software: <a href="https://infosec.exchange/tags/Element" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Element</span></a> X Android<br>📦 Affected Version: &lt;= 25.04.1<br>🆔 CVE: CVE-2025-27599<br>📊 CVSSv3.1: MEDIUM<br>⚠️ Prerequisites: Clicking on a crafted hyperlink or using a malicious app</p><p>Since Element X Android usually has the permission to access camera and microphone, this can be used to record audio and video from the victim. Pretty bad! 😨</p><p>🔗 Read more: <a href="https://herolab.usd.de/security-advisories/usd-2025-0010/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">herolab.usd.de/security-adviso</span><span class="invisible">ries/usd-2025-0010/</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE_2025_27599" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2025_27599</span></a> <a href="https://infosec.exchange/tags/SpyWare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpyWare</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a></p>
OTX Bot<p>COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs</p><p>Russian government-backed threat group COLDRIVER has developed a new malware called LOSTKEYS, capable of stealing files and system information. The group targets high-profile individuals, NGOs, and former intelligence officers through credential phishing and malware delivery. LOSTKEYS is delivered through a multi-step infection chain, starting with a fake CAPTCHA and involving PowerShell commands. The malware evades detection in VMs and uses a substitution cipher for decoding. COLDRIVER's primary goal is intelligence collection for Russia's strategic interests, targeting Western governments, militaries, journalists, and Ukraine-related individuals. The group has been linked to hack-and-leak campaigns in the UK and against NGOs.</p><p>Pulse ID: 681ba0e01c36344c7ac60892<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/681ba0e01c36344c7ac60892" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/681ba</span><span class="invisible">0e01c36344c7ac60892</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-07 18:05:20</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CAPTCHA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CAPTCHA</span></a> <a href="https://social.raytec.co/tags/ColdRiver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ColdRiver</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/Office" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://social.raytec.co/tags/Ukr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukr</span></a> <a href="https://social.raytec.co/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Tino Eberl<p><a href="https://mastodon.online/tags/KIMissbrauch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KIMissbrauch</span></a><br>Die Phishing-Plattform „Darcula“ setzt auf <a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> und macht es Kriminellen noch einfacher, täuschend echte Fake-Websites zu erstellen.</p><p>Ob bekannte Marken oder kleine Unternehmen – niemand ist mehr sicher vor Angriffen. Wie die Masche funktioniert, erfahrt ihr im Artikel.</p><p><a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://mastodon.online/tags/Cyberkriminalit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberkriminalität</span></a> <a href="https://mastodon.online/tags/Datensicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datensicherheit</span></a> <a href="https://mastodon.online/tags/Verbraucherschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verbraucherschutz</span></a> <a href="https://mastodon.online/tags/Verbraucherbetrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verbraucherbetrug</span></a></p><p><a href="https://tino-eberl.de/missbrauch-kuenstlicher-intelligenz/gefaehrlicher-denn-je-darcula-suite-nutzt-ki-fuer-perfektes-phishing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tino-eberl.de/missbrauch-kuens</span><span class="invisible">tlicher-intelligenz/gefaehrlicher-denn-je-darcula-suite-nutzt-ki-fuer-perfektes-phishing/</span></a></p>
BeyondMachines :verified:<p>Microsoft Telnet flaw enables credential theft through telnet links in phishing</p><p>A security vulnerability in the Microsoft Telnet Client's MS-TNAP authentication protocol allows attackers to silently steal Windows credentials when users connect to malicious Telnet servers. The flaw is affecting all Windows versions with the Telnet Client installed. It's easily exploitable through phishing email links and attachments with telnet:// URI links embedded.</p><p>**It's very uncommon for people to use Telnet protocol these days, and by default the program isn't even installed on Windows. But the first order of priority is NEVER to click on links or attachments from unexpected emails. Telnet links can be injected in almost anything, and if you have Telnet installed for whatever reason, your credentials may be compromised with a single click.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a><br><a href="https://beyondmachines.net/event_details/microsoft-telnet-flaw-enables-credential-theft-without-user-action-poc-published-q-h-x-a-s/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/microsoft-telnet-flaw-enables-credential-theft-without-user-action-poc-published-q-h-x-a-s/gD2P6Ple2L</span></a></p>
Fanch<p>Les dernières fuites de données de chez <a href="https://mamot.fr/tags/Free" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Free</span></a> commencent à être exploitées. Toutes les données sont justes, identité et iban. Publipostage très bien fait. <br><a href="https://mamot.fr/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://mamot.fr/tags/piratage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>piratage</span></a> <a href="https://mamot.fr/tags/freebox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebox</span></a> <br>.</p>
heise Security<p>"Passwort" Folge 31: Security-News von ChoiceJacking bis Slopsquatting</p><p>Chaos um CVEs, Rache gegen Ex-CISA-Chef, Backdoor in Fortinet-Geräten – es gibt viel zu erzählen. Auch in dieser Folge hadern die Hosts mit der Securitybranche.</p><p><a href="https://www.heise.de/news/Passwort-Folge-31-Security-News-von-ChoiceJacking-bis-Slopsquatting-10369723.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Passwort-Folge-3</span><span class="invisible">1-Security-News-von-ChoiceJacking-bis-Slopsquatting-10369723.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facebook</span></a> <a href="https://social.heise.de/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> <a href="https://social.heise.de/tags/PasswortPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswortPodcast</span></a> <a href="https://social.heise.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Silicon Apostate<p>My favorite way not to fail the inane <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> awareness tests at work.</p>
The Spamhaus Project<p>🌐 Spamhaus Reputation Statistics - ccTLDs:<br><a href="https://www.spamhaus.org/reputation-statistics/cctlds/domains/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/reputation-statis</span><span class="invisible">tics/cctlds/domains/</span></a></p><p><a href="https://infosec.exchange/tags/DomainAbuse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DomainAbuse</span></a> <a href="https://infosec.exchange/tags/TLDabuse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLDabuse</span></a> <a href="https://infosec.exchange/tags/Dynadot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dynadot</span></a> <a href="https://infosec.exchange/tags/DotAd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotAd</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a></p>
Claudius Link<p>I need some <a href="https://infosec.exchange/tags/FediPower" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediPower</span></a> or <a href="https://infosec.exchange/tags/WisdomOfTheCrowd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WisdomOfTheCrowd</span></a></p><p>For a published e-mail address, we get a ton of "job application" through nomaanoilandgas@googlegroups.com. The specific emails are inconspicuous. Some text, an attached pdf, "no" links in the body or PDF, nothing malicious as far as I can tell.</p><p>As googlegroups.com is owned by Google I assume it really is a Google Group. <br>But I can't find any information on this "group"</p><p><a href="https://groups.google.com/g/nomaanoilandgas" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">groups.google.com/g/nomaanoila</span><span class="invisible">ndgas</span></a> return "Content unavailable". <br>It could be a private group.</p><p>A web search doesn't return any results either</p><p>Did someone experience similar <a href="https://infosec.exchange/tags/SPAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPAM</span></a> or <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> emails and can elaborate further?<br><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p>
Cybernews<p>A Chinese cybercrime group is running a massive SMS phishing campaign.</p><p><a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/SMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> </p><p><a href="https://cnews.link/panda-shop-massive-chinese-sms-phishing-campaign-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/panda-shop-massive-</span><span class="invisible">chinese-sms-phishing-campaign-2/</span></a></p>
Trist | PCU Blogue :superpcu:<p>Enwaye!</p><p><a href="https://pkutalk.com/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://pkutalk.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2052598/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2052598/</span><span class="invisible"></span></a> Russian-linked Nebulous Mantis targets NATO, critical infrastructure with RomCom RAT <a href="https://pubeurope.com/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://pubeurope.com/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a> <a href="https://pubeurope.com/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://pubeurope.com/tags/nato" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nato</span></a> <a href="https://pubeurope.com/tags/NebulousMantis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NebulousMantis</span></a> <a href="https://pubeurope.com/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://pubeurope.com/tags/Prodaft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Prodaft</span></a> <a href="https://pubeurope.com/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://pubeurope.com/tags/ROMCOMRAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ROMCOMRAT</span></a> <a href="https://pubeurope.com/tags/spearphishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spearphishing</span></a></p>
BeyondMachines :verified:<p>Scam messages and emails targeting court translators, promising huge payments</p><p>A spear phishing campaign is actively targeting court translators, possibly using public records to craft convincing messages supposedly from "Prime Table Hub Translations". The scam is offering very high-paying translation jobs. The scammers actually aim to collect personal information, verified phone numbers and email addresses, images of documents and other details for advance-fee fraud, identity theft and resale of the collected data.</p><p>**Be very suspicious of unexpected messages with job offers requiring WhatsApp or Telegram communication. Be especially suspicious of those with unusually high pay and tight deadlines. Never share personal information or pay fees to receive work from unverified contacts. DON'T RUSH Always check with a technical persons. If your information is part of a public record database, be EXTRA suspicious of any communication (whether on email, messaging or phone), because you are more exposed.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/activescam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activescam</span></a><br><a href="https://beyondmachines.net/event_details/scam-messages-and-emails-targeting-court-translators-promising-huge-payments-l-r-u-u-h/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/scam-messages-and-emails-targeting-court-translators-promising-huge-payments-l-r-u-u-h/gD2P6Ple2L</span></a></p>
heise online<p>Montag: US-Budgetkürzung bedroht NASA-Missionen, Mozilla-Aus bei Google-Verlust</p><p>NASA vor Einschnitten + Warnung von Mozilla + Betrug per Paypal-Anruf + Scannen von Falschparkern + Temu stoppt US-Lieferungen + Quanten-Kryptografie in Firmen</p><p><a href="https://www.heise.de/news/Montag-US-Budgetkuerzung-bedroht-NASA-Missionen-Mozilla-Aus-bei-Google-Verlust-10371092.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Montag-US-Budget</span><span class="invisible">kuerzung-bedroht-NASA-Missionen-Mozilla-Aus-bei-Google-Verlust-10371092.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/DonaldTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DonaldTrump</span></a> <a href="https://social.heise.de/tags/eCommerce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eCommerce</span></a> <a href="https://social.heise.de/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.heise.de/tags/hoDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hoDaily</span></a> <a href="https://social.heise.de/tags/Journal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Journal</span></a> <a href="https://social.heise.de/tags/Mozilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozilla</span></a> <a href="https://social.heise.de/tags/NASA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NASA</span></a> <a href="https://social.heise.de/tags/Paypal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Paypal</span></a> <a href="https://social.heise.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.heise.de/tags/Quantencomputer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Quantencomputer</span></a> <a href="https://social.heise.de/tags/Verkehr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verkehr</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Nick Espinosa<p>Special Breach Report: Q1 2025 Stats!</p><p><a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a></p><p><a href="https://youtu.be/bKs52XgoBUQ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/bKs52XgoBUQ</span><span class="invisible"></span></a></p>
BeyondMachines :verified:<p>Cloud storage "payment failed" phishing attack</p><p>An active phishing email campaign masquerades as a cloud storage payment failure notification to create urgency. The email is using multiple technical deception elements to pass through the spam and phishing filters to steal credentials, payment information, and potentially install malware.</p><p>**Unexpected "past deadline" payment requests are a very common phishing vector, since they imply urgency. Don't rush, a provider will not delete your data - if they do, they can't charge you for another year! Consult with technical people, NEVER click links or files in such emails. If you are concerned about your cloud storage account, manually navigate to the official website of your hosting by typing the URL directly in your browser and check your account status there.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/activephishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activephishing</span></a><br><a href="https://beyondmachines.net/event_details/cloud-storage-payment-failed-phishing-attack-g-q-e-e-i/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cloud-storage-payment-failed-phishing-attack-g-q-e-e-i/gD2P6Ple2L</span></a></p>