toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

275
active users

#credentialtheft

0 posts0 participants0 posts today
LMG Security<p>Microsoft 365 credential theft is evolving quickly!</p><p>Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.</p><p>Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.</p><p>Watch now to learn:</p><p>▪ How Copilot can be used against you<br>▪ Real phishing tactics mimicking Microsoft 365, Adobe &amp; DocuSign<br>▪ Why SSO, OAuth, and poor access controls can make attacks worse<br>▪ What your organization must do to stay ahead</p><p>Watch the video! <a href="https://youtu.be/zaBwxy1Gjhc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zaBwxy1Gjhc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CoPilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoPilot</span></a> <a href="https://infosec.exchange/tags/ZeroTr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTr</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/Riskmanageemnt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Riskmanageemnt</span></a></p>
Bruce Sterling @bruces<p>*Politically hacking the smart toilet screens in the resort-town airport. <a href="https://mastodon.social/tags/InternetOfThings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetOfThings</span></a> <a href="https://mastodon.social/tags/credentialtheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credentialtheft</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/digitaloutsideofhome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaloutsideofhome</span></a> <a href="https://mastodon.social/tags/TwentyTwenties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TwentyTwenties</span></a> </p><p><a href="https://thethaiger.com/news/phuket/phuket-airport-scrambles-to-explain-cyberattack-on-digital-screen" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thethaiger.com/news/phuket/phu</span><span class="invisible">ket-airport-scrambles-to-explain-cyberattack-on-digital-screen</span></a></p>
LMG Security<p>Microsoft 365 credential theft is evolving—and AI tools like Microsoft Co-Pilot are becoming attackers' latest weapons!</p><p>Watch our new, 4-minute video, to learn how attackers use <a href="https://infosec.exchange/tags/CoPilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoPilot</span></a> for rapid reconnaissance and fraud, see real-world phishing examples targeting Microsoft 365, Adobe, and DocuSign, and understand why SSO and OAuth vulnerabilities significantly amplify credential risks. </p><p>We'll also share essential steps to protect your organization! <a href="https://youtu.be/zaBwxy1Gjhc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zaBwxy1Gjhc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CoPilotSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoPilotSecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/AIThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIThreats</span></a> <a href="https://infosec.exchange/tags/SaaSsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaaSsecurity</span></a> <a href="https://infosec.exchange/tags/DocuSignPhishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DocuSignPhishing</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p>
LMG Security<p>New Polymorphic browser attack alert: Malicious extensions mimic legitimate ones with pixel-perfect clones, disabling the real add-ons to steal credentials from Chrome, Edge &amp; others! </p><p>The malicious extensions clone the look and behavior of legitimate add-ons, including icons and workflows, and even temporarily disable the real extensions—tricking users into handing over sensitive credentials. Remind your team to only install extensions from trusted sources, monitor browser activity, and review permissions often.</p><p>Read the details: <a href="https://thehackernews.com/2025/03/researchers-expose-new-polymorphic.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/rese</span><span class="invisible">archers-expose-new-polymorphic.html</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Chromium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chromium</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/PolymorphicAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PolymorphicAttack</span></a></p>
nemo™ 🇺🇦<p>🚨 Security Alert! 🚨 A recent attack has compromised 16 Chrome extensions, exposing over 600,000 users to data theft! 🛡️ Cyberhaven was among the first affected, with malicious code stealing sensitive information. This highlights the vulnerabilities of browser extensions. Stay safe and review your installed extensions! 🔍✨ <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/ChromeExtensions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChromeExtensions</span></a> <a href="https://mas.to/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://mas.to/tags/PhishingAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhishingAttack</span></a> <a href="https://mas.to/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/12/16-c</span><span class="invisible">hrome-extensions-hacked-exposing.html</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a></p>
IT News<p>Yearlong supply-chain attack targeting security pros steals 390K credentials - A sophisticated and ongoing supply-chain attack operating for the past yea... - <a href="https://arstechnica.com/security/2024/12/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">12/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/</span></a> <a href="https://schleuss.online/tags/supplychainattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainattacks</span></a> <a href="https://schleuss.online/tags/credentialtheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credentialtheft</span></a> <a href="https://schleuss.online/tags/cryptomining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptomining</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://schleuss.online/tags/npm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>npm</span></a></p>
LMG Security<p>A new Fortinet VPN zero-day vulnerability is being exploited by a toolkit called 'DeepData'. The <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> gap allows credential dumping from memory after authentication. Until a patch is available, you should restrict VPN access and monitor for unusual login activity. IOCs are available in this article: <a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-exploit-fortinet-vpn-zero-day-to-steal-credentials/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/chinese-hackers-exploit-fortinet-vpn-zero-day-to-steal-credentials/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Databreach</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
Sean Whalen 👨🏼‍🦼🏳️‍🌈🇺🇦🕊️<p>The Russian cybercrime group FIN7 ran a network of fake AI undressing sites that delivered credential stealing malware to those who uploaded pictures. I gotta say, this is one group of cybercrime victims that I don't feel sorry for.</p><p><a href="https://www.silentpush.com/blog/fin7-malware-deepfake-ai-honeypot/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">silentpush.com/blog/fin7-malwa</span><span class="invisible">re-deepfake-ai-honeypot/</span></a></p><p><a href="https://infosec.exchange/tags/FIN7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIN7</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/NetSupport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetSupport</span></a> <a href="https://infosec.exchange/tags/NetSupportRAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetSupportRAT</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Deepfake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deepfake</span></a> <a href="https://infosec.exchange/tags/Deepfakes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deepfakes</span></a> <a href="https://infosec.exchange/tags/DeepNude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepNude</span></a> <a href="https://infosec.exchange/tags/DeepNueds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepNueds</span></a> <a href="https://infosec.exchange/tags/SilentPush" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SilentPush</span></a></p>
Paul Shread<p>A cloud vulnerability a lot of people apparently don't know about: .env files contain secrets such as hard-coded cloud access keys, and not configuring them properly can lead to very bad things. <br><a href="https://masto.ai/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://masto.ai/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://masto.ai/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://masto.ai/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://masto.ai/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://masto.ai/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://masto.ai/tags/CloudStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudStorage</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/AttackSurfaceManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AttackSurfaceManagement</span></a> <a href="https://masto.ai/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a> </p><p><a href="https://thecyberexpress.com/cloud-extortion-campaign-hacks-aws-env-files/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/cloud-exto</span><span class="invisible">rtion-campaign-hacks-aws-env-files/</span></a></p>
IT News<p>Mysterious family of malware hid in Google Play for years - Enlarge </p><p>A mysterious family of Android malware with a demonst... - <a href="https://arstechnica.com/?p=2040171" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2040171</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/credentialtheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credentialtheft</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it</p>
Techy Geek :verified:<p>Cybercriminals are using a malicious Telegram bot!</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <br><a href="https://infosec.exchange/tags/Telekopye" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telekopye</span></a><br><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a><br><a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a></p><p><a href="https://thehackernews.com/2023/11/cybercriminals-using-telekopye-telegram.html?m=1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2023/11/cybe</span><span class="invisible">rcriminals-using-telekopye-telegram.html?m=1</span></a></p>