zirk.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
Literature, philosophy, film, music, culture, politics, history, architecture: join the circus of the arts and humanities! For readers, writers, academics or anyone wanting to follow the conversation.

Administered by:

Server stats:

732
active users

#phishing

77 posts59 participants16 posts today

Cybercrime: Komplize Google

Google unterstützt alle Arten von Cybercrime auf vielfältige* Weise. Darüber habe ich schon häufig berichtet. Das Motiv der Firma dürfte finanzieller Natur sein. Direkt nimmt die Firma Geld ein, indem sie Daten auch an SPAMmer verkauft oder Werbeplätze an Betrüger oder Malware-Verbreiter. Indirekt

pc-fluesterer.info/wordpress/2

www.pc-fluesterer.infoCybercrime: Komplize Google | pc-flüsterer bremen

Yeah, phishing is still a major pain, let's be honest. But banking *solely* on a firewall these days? Sorry, that's just not gonna cut it anymore.

Think about it: attackers are constantly leveling up their social engineering game, and yep, they're even finding ways around MFA now. 🤯

This is precisely where browser-based detection starts looking way smarter. Instead of just flagging known bad indicators (IoCs), it actually analyzes the *entire* page content. It's checking out the attackers' Tactics, Techniques, and Procedures (TTPs), which gives you a much clearer picture. And the crucial part? It does this in real-time! ☝️

Why the focus on the browser? Well, because that's where pretty much everything happens online! Plus, relying heavily on blocklists is kind of a losing battle – the bad guys switch up their IPs and domains so fast, those lists are often outdated the moment they're published. 🙄

So, here’s the bottom line: It's time to get serious about browser security. Alongside that, keep hammering home good password hygiene and make sure your team is getting regular, relevant security training!

What about you? Are you already using any browser-based security solutions? We'd love to hear what your experience has been like. Share your thoughts below! 👇

Trust is the foundation of our digital world but what happens when it’s exploited?

Every day, we rely on trust: in the emails we open, the websites we browse, and the calls we answer. But #cybercriminals exploit this trust through #spoofing, a deceptive tactic that hijacks familiar names, brands, and channels to blur the line between legitimacy and fraud.

⚠️The consequences? Breaches, financial loss, and eroded confidence.

Read our latest article where we break down:
- The most common types of spoofing
- Its real-world impact
- How to defend yourself and your organization

🚨 Don’t wait until it’s too late.
Knowledge is your best defense: crowdsec.net/glossary/what-is-

crowdsec.netWhat Is Spoofing? | CrowdSecUnderstand what is spoofing, the types of spoofing methods, their devastating impact, and, how to protect yourself and your organization.

Whoa, that Google phishing scam was pretty wild, wasn't it? 🤯 Seriously, DKIM replay *and* abusing Google Sites... somebody got *really* creative there.

Look, we all know phishing isn't new. But the ingenuity attackers are showing lately? It's genuinely getting a bit unnerving. And the real kicker? Too many companies still think a simple automated scan has their back. Spoiler: it doesn't. Catching sophisticated stuff like this often takes a proper penetration tester who knows where to look.

It's always a good feeling when we help clients spot these things before they blow up. Honestly, though, security really needs to be driven from the top and actually get the budget it deserves.

Makes you think, huh? How long 'til we see the first wave of AI-driven phishing attacks that are *scarily* good? Gives me the chills!