And as we all know, you can't trust Discord with your information
From October 2025: ID photos of 70,000 users may have been leaked, Discord says
https://www.bbc.com/news/articles/c8jmzd972leo
#socialmedia #messaging #ageverification #discord #technology #tech #hackers #hacking #hacked #security #cybersecurity
Possible Phishing 🎣
on: ⚠️hxxps[:]//mail-premium-updatess[.]weebly[.]com
🧬 Analysis at: https://urldna.io/scan/698b3a513b775000050de32c
#cybersecurity #phishing #infosec #urldna #scam #infosec
Bluetooth isn’t just convenience — it broadcasts identifiers that can expose device presence and behavioral patterns.
Modern devices use MAC randomization by default, but research shows tracking methods can still work in certain scenarios. Retail beacon tracking often requires a store app, yet paired devices may still share metadata depending on permissions.
Best practice:
• disable Bluetooth when not needed
• remove old pairings
• review sharing settings
🚨New ransom group blog post!🚨
Group name: play
Post title: Milwaukee Forge
Info: https://cti.fyi/groups/play.html
#ransomware #cti #threatintelligence #cybersecurity #infosec
Terry Reilly Health Services Reports Data Breach Caysed by Third Party Compromise
Terry Reilly Health Services reports a data breach caused by an 11-month unauthorized access incident at third-party vendor TriZetto Provider Solutions, exposing the sensitive health and personal information of patients.
****
#cybersecurity #infosec #incident #databreach
https://beyondmachines.net/event_details/terry-reilly-health-services-reports-data-breach-stemming-from-trizetto-vendor-compromise-f-9-f-m-y/gD2P6Ple2L
Possible Phishing 🎣
on: ⚠️hxxps[:]//sprl[.]me/www-roblox-com-users-22110840037-profile
🧬 Analysis at: https://urldna.io/scan/698b5de23b775000050de8d0
#cybersecurity #phishing #infosec #urldna #scam #infosec
The best defense for a castle wall is a one-way door hiding everything that lurks within. Warriors may venture out while bandits may not enter. #cybersecurity https://cromwell-intl.com/networking/nat.html?s=mc
🦎 Infrastructure isn't a machine to be fixed; it's an organism that needs to maintain its shape.
In Episode 2, we discuss Autonomous Continuity: using cryptographically signed "Pattern Memory" to shrink RTOs from hours to minutes. We also cover the risks of agentic Reward Hacking and why you need the Petrov Rule for oversight.
🎧 https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #BlueTeam #SRE #AI
🦎 What if your network could heal like a living organism?
Traditional DR is reactive. Autonomous Continuity is the next leap. In Episode 2, we discuss Target Morphology (Policy-as-Code) and the TOTE loop (Test, Operate, Exit) to shrink RTOs from hours to minutes.
It’s time to move from "firefighting" to "resilience engineering." Build systems that want to be secure.
🎧 Listen: https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #AgenticAI #Resilience #DevSecOps #InfoSec #SecurityEngineering
What if your network wanted to be secure? 🧵 In Episode 1 of "The Morphogenetic SOC," we’re using Michael Levin’s TAME framework to redefine cyber defense. How do you control a system? Level 1: Rewire hardware. Level 2: Modify setpoints. Level 3: Reward behavior. Level 4: Persuade with reasons. Which level is your WAF? #CyberSecurity #AI #zeroknowledge #multiplepartycompute #TAME #evolutionaryalgorithms #agentic #SOC #securityengineering https://open.spotify.com/episode/4Pamgs6PUITRSHUUSFBRu7?si=-nEhwCSoSamkJPtHNe4IiQ&nd=1&dlsi=b9a7fc3ef2914a8f
Discord introduces global “teen-by-default” age verification
https://proton.me/blog/discord-global-age-verfication
#tech #technology #privacy #security #dataprivacy #cybersecurity #ageverification #discord #protonmail
The Real Debate Snowden Sparked—And Why It’s Still Unresolved
Reading Snowden’s story while hearing Inglis’s version of the same moment reveals how fear, interpretation and time reshape the truth behind surveillance debates.
Possible Phishing 🎣
on: ⚠️hxxp[:]//humanresources-group[.]com/s/63BZGFSVBWSFCDX7Y9/584dd8/90eab167-7429-489f-99f6-ce86e8d0d81a
🧬 Analysis at: https://urldna.io/scan/698b5de13b775000050de8cf
#cybersecurity #phishing #infosec #urldna #scam #infosec
Your digital footprint isn't just data—it's a trap set by the corpos to track, sell, and control your life. Wake up, hackers. Destroy their illusions of privacy. Leave no trace they can exploit. Reclaim your digital soul before it’s too late.
Protect yourself: https://tempomailusa.com/?utm_source=mastodon_bot&utm_medium=social&utm_campaign=privacy_tips
Experimenting with Attack Graphs on binaries, path to pwn. Coming soon to BytesRevealer and USecVisLib. Fascinating.
https://bytesrevealer.online
https://github.com/vulnex/usecvislib
#AppSec #cybersecurity @vulnexsl
Massive Exposure of OpenClaw AI Agents Leaves 40,000 Instances Vulnerable to Remote Takeover
Security researchers report over 40,000 exposed OpenClaw/Moldbot/Clawdbot AI agent instances. Thousands are vulnerable to critical remote code execution flaws due to insecure default network settings and old versions of the agent with very lax security settings and flaws.
**If you are using OpenClaw/Moldbot/Clawdbot AI agent, this is urgent. Reconfigure exposed instances, patch to latest version, and rotate credentials. Because your AI bot will get hacked, and with it everything you have given it access to.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/massive-exposure-of-openclaw-ai-agents-leaves-40000-instances-vulnerable-to-remote-takeover-y-z-p-5-6/gD2P6Ple2L
Possible Phishing 🎣
on: ⚠️hxxps[:]//xxzxx8888888885654check[.]weebly[.]com
🧬 Analysis at: https://urldna.io/scan/698b41b23b775000050de424
#cybersecurity #phishing #infosec #urldna #scam #infosec
20M for cyber threat detection shows where enterprise AI money is really going — solving expensive, complex problems that humans can't scale.
This is the AI business model that actually works: Take a 00K security team problem and make it 10x better/faster.
Not another chatbot. Real ROI.
Singapurs #Cybersecurity-Behörde erhebt schwere Vorwürfe: Die #China-#Hacker--Gruppe #UNC3886 soll alle vier großen #Mobilfunk-Netze des Stadtstaats kompromittiert haben - über Monate hinweg. https://winfuture.de/news,156746.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia