toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

281
active users

#ceofraud

0 posts0 participants0 posts today
Tino Eberl<p><a href="https://mastodon.online/tags/KIMissbrauch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KIMissbrauch</span></a> <a href="https://mastodon.online/tags/Retr%C3%B6t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Retröt</span></a></p><p><a href="https://mastodon.online/tags/Betr%C3%BCger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betrüger</span></a> in <a href="https://mastodon.online/tags/Hongkong" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hongkong</span></a> haben mithilfe von <a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> und <a href="https://mastodon.online/tags/Deepfake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deepfake</span></a>-Technologie eine <a href="https://mastodon.online/tags/Videokonferenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Videokonferenz</span></a> inszeniert und so 24 Mio. Euro erbeutet.</p><p>Das Opfer dachte, es spreche mit echten Kolleg*innen, während alle anderen Teilnehmer KI-generierte <a href="https://mastodon.online/tags/Klone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Klone</span></a> waren.</p><p>Der Fall zeigt, wie raffiniert CEO-Fraud mittlerweile geworden ist.</p><p><a href="https://mastodon.online/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://mastodon.online/tags/Betrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betrug</span></a> <a href="https://mastodon.online/tags/Finanzbetrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Finanzbetrug</span></a> <a href="https://mastodon.online/tags/Deepfakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deepfakes</span></a> <a href="https://mastodon.online/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://mastodon.online/tags/CEOFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOFraud</span></a></p><p><a href="https://tino-eberl.de/missbrauch-kuenstlicher-intelligenz/ki-klon-betrug-in-hongkong-videokonferenz-mit-deepfakes-bringt-millionenbeute/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tino-eberl.de/missbrauch-kuens</span><span class="invisible">tlicher-intelligenz/ki-klon-betrug-in-hongkong-videokonferenz-mit-deepfakes-bringt-millionenbeute/</span></a></p>
Bundesnetzagentur<p>Uns erreichen vermehrt Beschwerden zu <a href="https://social.bund.de/tags/Betrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betrug</span></a> durch <a href="https://social.bund.de/tags/CEOFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOFraud</span></a>. Mitarbeiter werden dabei von vermeintlichen Führungskräften über <a href="https://social.bund.de/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> kontaktiert und zu Zahlungen gedrängt. Mithilfe zuvor gesammelter Daten verschaffen sich die Betrüger die nötige Autorität. <a href="https://www.bundesnetzagentur.de/1052240" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bundesnetzagentur.de/1052240</span><span class="invisible"></span></a></p>
Tino Eberl<p>Betrüger in <a href="https://mastodon.online/tags/Hongkong" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hongkong</span></a> haben mithilfe von <a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> und Deepfake-Technologie eine <a href="https://mastodon.online/tags/Videokonferenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Videokonferenz</span></a> inszeniert und so 24 Millionen Euro erbeutet.</p><p><a href="https://tino-eberl.de/missbrauch-kuenstlicher-intelligenz/ki-klon-betrug-in-hongkong-videokonferenz-mit-deepfakes-bringt-millionenbeute/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tino-eberl.de/missbrauch-kuens</span><span class="invisible">tlicher-intelligenz/ki-klon-betrug-in-hongkong-videokonferenz-mit-deepfakes-bringt-millionenbeute/</span></a></p><p>Das Opfer dachte, es spreche mit echten Kolleg*innen, während alle anderen Teilnehmer KI-generierte Klone waren. Der Fall zeigt, wie raffiniert <a href="https://mastodon.online/tags/CEOFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOFraud</span></a> mittlerweile geworden ist und unterstreicht die Notwendigkeit zusätzlicher <a href="https://mastodon.online/tags/Sicherheitsma%C3%9Fnahmen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitsmaßnahmen</span></a> in Unternehmen. </p><p><a href="https://mastodon.online/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://mastodon.online/tags/Betrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betrug</span></a> <a href="https://mastodon.online/tags/Finanzbetrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Finanzbetrug</span></a> <a href="https://mastodon.online/tags/Deepfakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deepfakes</span></a> <a href="https://mastodon.online/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a></p>
cuNha<p>"o IPBeja recebeu um email de um endereço comum (“dept.contabilidade@outlook.com”) pedindo para não efetuar o pagamento para “a conta antiga”. “Não é mais disponível”, lia-se. Foi para o IBAN indicado nessas mensagens que a transferência de 50.421,49 euros foi feita dias depois." :that_chapter_wtf:</p><p><a href="https://mstdn.social/tags/fraude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraude</span></a> <a href="https://mstdn.social/tags/CEOFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOFraud</span></a></p><p><a href="https://pplware.sapo.pt/internet/politecnico-de-beja-vitima-de-fraude-informatica-roubados-50-mil-euros/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pplware.sapo.pt/internet/polit</span><span class="invisible">ecnico-de-beja-vitima-de-fraude-informatica-roubados-50-mil-euros/</span></a></p>
OleHippieChick<p><span class="h-card" translate="no"><a href="https://masto.ai/@rbreich" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rbreich</span></a></span> "Top salaries and bonuses must be paid to obtain the very best of the CEO crop," they say, only to find out they've hired incompetent, greedy dirtbags whom they then ply with money on the way out the door because they're too Fn embarrassed to admit they hired the greedy dirtbag. This is another insane construct of people living in their far-too-much-money Fantasyland. The people don't need this B.S.<br><a href="https://mstdn.social/tags/CEOFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOFraud</span></a> <br><a href="https://mstdn.social/tags/WhenPlanesFallOutOfTheSky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhenPlanesFallOutOfTheSky</span></a> <br><a href="https://mstdn.social/tags/WhenPlaneDoorsBlowOut" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhenPlaneDoorsBlowOut</span></a></p>
Christian Fischer<p>Let's all calm down now, ok? Sure, deepfake video calls can be trustworthy enough to lure a potential victim into rash actions. But how many employees of a company are actually authorised to initiate transfers of millions of dollars? The theoretical attack surface is therefore much smaller than such headlines suggest. Effectively training the awareness of such a small number of employees should not be too difficult now. All it takes is for your CEO to tell you that he will never give you payment instructions via video call <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://infosec.exchange/tags/fraudprevention" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraudprevention</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/internalfraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internalfraud</span></a> <a href="https://infosec.exchange/tags/ThreatCloudAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatCloudAI</span></a> <a href="https://infosec.exchange/tags/payrollfraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payrollfraud</span></a> <a href="https://infosec.exchange/tags/TRENDINGNOW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TRENDINGNOW</span></a> <a href="https://infosec.exchange/tags/cyberfraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberfraud</span></a> <a href="https://infosec.exchange/tags/CyberTalk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberTalk</span></a> <a href="https://infosec.exchange/tags/CEOfraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEOfraud</span></a> <a href="https://infosec.exchange/tags/fraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraud</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a></p><p><a href="https://www.darkreading.com/threat-intelligence/deepfake-apps-explode-multimillion-dollar-corporate-heists" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/threat-intelli</span><span class="invisible">gence/deepfake-apps-explode-multimillion-dollar-corporate-heists</span></a></p>