techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.3K
active users

#CyberAware

5 posts5 participants0 posts today

Hackers are bypassing #MFA with new #phishing kits like SneakyLog!

Watch our 4-minute video to learn how attackers are stealing MFA codes, session tokens, and cookies using sophisticated tools sold as malware-as-a-service.

We'll share:

▪ How SneakyLog mimics login portals & detects fake traffic.
▪ How blurry login pages trick users into giving up credentials.
▪ How to defend against MFA bypass with Zero Trust, hardware tokens, SSO, and more.

As attackers pivot between platforms—it's time to strengthen your identity protections!

🎥 Watch Now: youtu.be/7Vipr_EySwI

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Microsoft 365 credential theft is evolving—and AI tools like Microsoft Co-Pilot are becoming attackers' latest weapons!

Watch our new, 4-minute video, to learn how attackers use #CoPilot for rapid reconnaissance and fraud, see real-world phishing examples targeting Microsoft 365, Adobe, and DocuSign, and understand why SSO and OAuth vulnerabilities significantly amplify credential risks.

We'll also share essential steps to protect your organization! youtu.be/zaBwxy1Gjhc

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

New Cyberside Chats Episode Alert! This week, @sherridavidoff and @MDurrin dive into scary new examples of AI deepfake scams that cybercriminals are using to look and sound just like trusted brands.

Watch or listen to the full episode to hear a jaw-dropping #Apple help desk deepfake incident, and learn how attackers are using voice clones, #YouTube, and even #Google to trick security teams.

▶️ Watch: ow.ly/3h1650Vmymo
🎙️ Listen: ow.ly/lsYh50Vmymq

Help Desk Spoofing + Email Bombing = A Dangerous New Combo

Attackers are posing as internal IT staff, using email bombing to distract users and gain remote access—often deploying ransomware through Microsoft Teams and Quick Assist.

Watch the video to see a real-world example of how cybercriminals bypass traditional phishing defenses using cloud tools and AI-driven social engineering. We'll also share how to protect your organization with better verification, secure configurations, and smart incident response planning. youtu.be/RhKFx_ZRz4A

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

The recent Microsoft Outlook outage left thousands scrambling. But it wasn’t just a fluke—recent outages from CrowdStrike, AT&T, and UK banks prove that business interruption is one of the biggest risks organizations face today.

Watch the full episode of this week’s Cyberside Chats in which @sherridavidoff and @MDurrin break down the latest Microsoft outage and share practical advice to reduce your downtime and risk!

🎧Listen here: chatcyberside.com/e/navigating
🎥 Watch here: youtu.be/n5V2aL8XG7k

www.chatcyberside.comWhen Microsoft Goes Down: Cyber Risk & Resilience | Cyberside Chats: Cybersecurity Insights from the ExpertsThe March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption. Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services. Actionable Takeaways: Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages. Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions. Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making. Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks. Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories. Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider. Links & References: Microsoft’s Global Outage Coverage (CNBC) Cyber Insurance Report – Business Interruption Trends (AM Best) CrowdStrike Q4 2025 Earnings Report UK Banking System Outage (The Times) World Economic Forum Cybersecurity Outlook 2025 #microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats

LMG Security’s Top Cybersecurity Control for Q1 2025 is AI Readiness!

AI is transforming cybersecurity, but are you prepared for the risks? LMG Security's @sherridavidoff outlines key steps to reduce your organization's cybersecurity risks from AI-powered threats.

From shadow AI usage to data leakage and adversarial attacks, organizations must take proactive steps now to protect their systems. Learn how to build AI security policies, monitor AI implementations, and defend against emerging threats in this new blog. lmgsecurity.com/ai-readiness-t

ai readiness image 2
LMG SecurityAI Readiness: The Top Cybersecurity Control of Q1 2025 | LMG SecurityAI-driven tools are revolutionizing security defenses, but they’re also exposing organizations to new risks. Read our AI readiness steps that will protect your organization and data.

An open sourcxe AI traiing dataset lheld 12,000+ API keys & passwords! New research from Truffle Security uncovered nearly 12,000 valid API keys and passwords embedded in AI training datasets from Common Crawl—a widely used open-source web archive. These leaked secrets include AWS root keys, MailChimp API keys, and Slack webhooks, which can expose companies to data breaches, phishing, and supply chain risks.

As AI adoption grows, organizations must secure their code, scan for exposed credentials, and enforce strict key management policies to prevent unauthorized access and data leaks.

Read more details: ow.ly/Esop50V9vPT

#Cybersecurity #AISecurity #GenAI #AI #Databreach #APIsecurity #Infosec #RiskManagement #CISO #Cyberaware #SMB #CEOet/

BleepingComputer · Nearly 12,000 API keys and passwords found in AI training datasetBy Ionut Ilascu