corteximplant.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
CORTEX IMPLANT - an international cyberpunk'ish LGBTQIA+ friendly Fediverse instance for edgerunners, netrunners and cyberpunks and all who want to become one.

Administered by:

Server stats:

237
active users

#Phishing

20 posts20 participants2 posts today
Public

C'est de plus en plus n'importe quoi l'usage du téléphone... J'avoue que ce soit en pro ou perso, je ne reçois quasi que des appels de #spam aujourd'hui...

Votre numéro de téléphone est signalé en spam chez les autres ? Découvrez pourquoi et comment y remédier

De plus en plus de Français reçoivent des #SMS de #phishing venant de numéros de téléphone qui, étonnement, appartiennent à des gens honnêtes. Si le vôtre est listé, il est possible d'y remédier, heureusement !

clubic.com/actualite-557493-vo

Clubic.com · Votre numéro de téléphone est signalé en spam chez les autres ? Découvrez pourquoi et comment y remédierBy Alexandre Boero
Public

Google Cloud (ex. Mandiant): cloud.google.com/blog/topics/t

Mandiant details in this article Browser-in-the-Middle (BitM) attacks, a sophisticated session stealing technique that bypasses multi-factor authentication. Unlike traditional transparent proxies like Evilginx2 that require extensive customization, BitM offers attackers a streamlined approach to compromise web application sessions with minimal configuration. The article describes Mandiant's internal tool 'Delusion' for performing BitM attacks and demonstrates how attackers can steal authenticated sessions even when protected by MFA. The authors recommend implementing hardware-based MFA solutions like FIDO2 security keys and client certificates as effective countermeasures against these attacks.

Google Cloud BlogBitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique | Google Cloud BlogThe browser in the middle technique can enable compromises, especially if defenses and MFA aren't properly implemented.
Public

Via #LLRX - @psuPete Recommends – Weekly highlights on cyber security issues, March 15, 2025: Four highlight's from this week's column - The 200+ Sites an #ICE #Surveillance Contractor is Monitoring; US cities warn of wave of unpaid parking #phishing texts; #OPM watchdog to investigate #IT risks tied to #DOGE agency access; and A Brand-New Botnet Is Delivering Record-Size #DDoS Attacks. #cybercrime #cyber #security #privacy llrx.com/2025/03/pete-recommen

www.llrx.comPete Recommends – Weekly highlights on cyber security issues, March 15, 2025 – LLRX
Public

Cyberkriminelle nutzen aktuell gefälschte OAuth-Anwendungen, die sich als bekannte Dienste wie Adobe Acrobat, Adobe Drive oder DocuSign ausgeben. Ziel dieser Angriffe ist es, sich Zugriff auf Microsoft-365-Konten zu erschleichen. Im Beitrag erfährst du auch, wie du dich vor solchen Angriffen schützen kannst.

teufelswerk.net/achtung-vor-bo

teufelswerk
teufelswerk | IT-Sicherheit & Cybersecurity · Achtung vor bösartigen Adobe- und DocuSign-OAuth-Apps: So schützt du dein Microsoft-365-KontoAchtung vor bösartigen Adobe- und DocuSign-OAuth-Apps - So schützt du dein Microsoft-365-Konto: Cyberkriminelle nutzen aktuell gefälschte OAuth-Anwendungen,
Public

Cybercriminals are now exploiting CSS to bypass spam filters & track user actions! 😱 Cisco Talos reports attackers use CSS properties like text_indent & opacity to hide content & redirect to phishing pages. Stay safe with advanced filtering & email privacy proxies! 🛡️ #cybersecurity #phishing thehackernews.com/2025/03/cybe #newz

The Hacker NewsCybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' ActionsHackers exploit CSS in emails to bypass spam filters and track user actions, raising privacy concerns.
Public

A widespread #phishing campaign has targeted nearly 12,000 #GitHub repositories with
🔥fake "Security Alert" issues,
tricking developers into authorizing a malicious OAuth app that grants attackers full control over their accounts and code.

"Security Alert: Unusual Access Attempt We have detected a login attempt on your GitHub account that appears to be from a new location or device," -- reads the GitHub phishing issue.
All of the GitHub phishing issues contain the same text, warning users that there was unusual activity on their account from Reykjavik, Iceland, and the 53.253.117.8 IP address.

bleepingcomputer.com/news/secu

BleepingComputerFake "Security Alert" issues on GitHub use OAuth app to hijack accounts
More from
Public

Ein Dankeschön an die selbstlosen Cyberkriminellen, die mir heute eine Phishing-Mail (Imitat einer Bank) zugesendet haben !! 😎 !!
Der enthaltene Link führte mich zu einer nicht vorhandenen Seite "404 - Not found". Beim Wechsel auf die Hauptdomain stieß ich auf öffentlich zugängliche, downloadbare "Index of"-Verzeichnisse mit aktuellen Html- und PHP-Templates, Javascript-Dateien, Telegram-Bots für Phishing-Kampagnen (Banken, Cloud-Dienste, Telekommunikation)
#phishing #spam #scam #cybersecurity

Public

Looks like there is some good human manipulation, er, "social engineering" lately using a pretext of looking for security work and sending links through weird domains that redirect to calendly links for what I assume is an opportunity to continue the con. For now, I would BOLO URIs with ?redirectTo=https://calendly.com/* in the parameters. I can't say they're necessarily malicious, but I would certainly scrutinize them and the domain you see them redirected from, especially if the original subdomain is t or trk.

Public

Decent attempt at a phone number validation operation which could lead to phishing or financial scams.

If you are on the fence, check whitepages.com to see which carrier the number belongs to. No Good Samaritan is going to be texting you from a VOIP service you’ve never heard of. Particularly not Onvoy, which the bad guys tend to prefer.

When in doubt, delete and report. And please have these conversations with your parents, and your children.