mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

10K
active users

#cybercriminals

3 posts3 participants0 posts today
PrivacyDigest<p><a href="https://mas.to/tags/Hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackers</span></a> —hope to defect to <a href="https://mas.to/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> ? Don’t <a href="https://mas.to/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> “ <a href="https://mas.to/tags/defecting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defecting</span></a> to Russia.” </p><p>To the casual observer, <a href="https://mas.to/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> can look like swashbuckling geniuses. </p><p>They possess technical skills formidable enough to penetrate the networks of the biggest companies on the planet.</p><p>They cover their tracks using technology that is arcane to most people—VPNs, <a href="https://mas.to/tags/encrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypted</span></a> <a href="https://mas.to/tags/chat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chat</span></a> apps, onion routing, aliases in dark web forums.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://mas.to/tags/tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tor</span></a> <a href="https://mas.to/tags/onionrouting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>onionrouting</span></a> <a href="https://mas.to/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a></p><p><a href="https://arstechnica.com/security/2025/07/hackers-hope-to-defect-to-russia-dont-google-defecting-to-russia/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/hackers-hope-to-defect-to-russia-dont-google-defecting-to-russia/</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🎉 Official Welcome: BLACKCLOAK Joins ITSPmagazine’s BlackHat USA 2025 Coverage</p><p>We are pleased to welcome BlackCloak as a Full Sponsor of our On Location Coverage at <a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> USA 2025 in Las Vegas.</p><p>Hey Chris Pierson, let's see if we can get creative and top this shot!🤘✨ <br>Looking forward to see you and have another great chat! </p><p><a href="https://infosec.exchange/tags/BlackCloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCloak</span></a> is a pioneer in Digital Executive Protection, delivering <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and privacy solutions tailored for high-net-worth individuals, corporate executives, and their families. As <a href="https://infosec.exchange/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> increasingly target the personal lives of business leaders to gain access to enterprise networks, BlackCloak provides a critical layer of defense — extending security beyond the office and into the home.</p><p>With a blend of cutting-edge technology and white-glove service, BlackCloak protects against threats like personal data leaks, home network intrusions, device compromise, and digital surveillance.</p><p>Check out <a href="https://infosec.exchange/tags/BlackCloack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCloack</span></a>'s Website here: <a href="https://itspm.ag/itspbcweb" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/itspbcweb</span><span class="invisible"></span></a></p><p>📌 Visit BlackCloak’s page on ITSPmagazine to learn more about their mission and presence in our Black Hat coverage:<br>👉 <a href="https://www.itspmagazine.com/directory/blackcloak" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/bla</span><span class="invisible">ckcloak</span></a></p><p>📰 Explore our full Black Hat USA 2025 coverage here:<br>👉 <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p>Since 2015, Black Hat has been a cornerstone event for ITSPmagazine, and we’re proud to continue spotlighting the companies and people shaping the future of cybersecurity. Our 2025 program includes exclusive on-site interviews, sponsored briefings, and editorial features designed to share timely insights with our global audience.</p><p>📣 There is still time to join this year’s coverage:<br>✔️ 2 Full Sponsorship Opportunities Remaining<br>✔️ A VERY Limited Number of On Location Briefings Available</p><p>🔗 Learn more and reserve your spot:<br>• Sponsorships: <a href="https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/event-coverag</span><span class="invisible">e-sponsorship-and-briefings</span></a><br>• Briefings: <a href="https://www.itspmagazine.com/event-coverage-briefings" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/event-coverag</span><span class="invisible">e-briefings</span></a></p><p>We thank the team at BlackCloak for supporting our 2025 Black Hat USA coverage — we look forward to sharing their story from the floor in Las Vegas.</p><p>Marco Ciappelli &amp; Sean Martin, CISSP</p><p><a href="https://infosec.exchange/tags/BlackHatUSA2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/BlackCloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCloak</span></a> <a href="https://infosec.exchange/tags/ExecutiveProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExecutiveProtection</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/DigitalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSecurity</span></a> <a href="https://infosec.exchange/tags/ITSPmagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSPmagazine</span></a> <a href="https://infosec.exchange/tags/OnLocationCoverage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnLocationCoverage</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/PersonalCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PersonalCybersecurity</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
Alex@rtnVFRmedia Suffolk UK<p><a href="https://social.tchncs.de/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> were able to successfully target a 158 year old <a href="https://social.tchncs.de/tags/transport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transport</span></a> company in <a href="https://social.tchncs.de/tags/England" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>England</span></a> with <a href="https://social.tchncs.de/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>, putting them out of business with 700 jobs lost when they were unable to pay the ransom..</p><p><a href="https://social.tchncs.de/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.tchncs.de/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a></p><p><a href="https://www.bbc.co.uk/news/articles/cx2gx28815wo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bbc.co.uk/news/articles/cx2gx2</span><span class="invisible">8815wo</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>&gt; <a href="https://mastodon.social/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> found a way to slice up <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> into small encoded fragments, and place them into a <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> TXT record under different subdomains. It’s essentially a digital jigsaw puzzle scattered across different addresses. On its own, each part is harmless, but when reassembled, it forms a malicious file.</p><p><a href="https://www.techradar.com/pro/security/it-seems-even-dns-records-can-be-infected-with-malware-now-heres-why-thats-a-major-worry" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/it-</span><span class="invisible">seems-even-dns-records-can-be-infected-with-malware-now-heres-why-thats-a-major-worry</span></a></p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@stman" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stman</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@Sempf" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Sempf</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@LaF0rge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LaF0rge</span></a></span> yes.</p><p>Because physical SIMs, like any <em>"cryptographic chipcard"</em> (i.e. <span class="h-card" translate="no"><a href="https://social.nitrokey.com/@nitrokey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nitrokey</span></a></span> ) did all that fancy public/private crypto on silicon and unless that was compromizeable (which AFAICT always necessistated physical access to the <a href="https://infosec.space/tags/SIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIM</span></a>, espechally in pre-<a href="https://infosec.space/tags/OMAPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OMAPI</span></a> devices) the SIM wasn't <em>'cloneable'</em> and the weakest link always had been the <a href="https://infosec.space/tags/MNO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MNO</span></a> /.<a href="https://infosec.space/tags/MVNO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MVNO</span></a> issueing (may it be through <a href="https://infosec.space/tags/SocialHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialHacking</span></a> employees into <em><a href="https://infosec.space/tags/SimSwapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SimSwapping</span></a></em> or LEAs showng up with a warrant and demanding <em>"<a href="https://infosec.space/tags/LawfulInterception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LawfulInterception</span></a>"</em>):</p><ul><li>These <em>"attack vectors"</em> were known and whilst <em>unfixable</em> they could at least be mitigated by i.e. <em>NEVER</em> using a <a href="https://infosec.space/tags/PhoneNumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhoneNumber</span></a> for anything <em>and/or</em> using anonymously obtained <a href="https://infosec.space/tags/SIMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIMs</span></a>. But more and more services like <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> did <a href="https://infosec.space/tags/regression" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regression</span></a> demanding <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PII</span></a> <em>and</em> more and more nations <em>criminalized</em> <a href="https://infosec.space/tags/AnonymousSimCards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnonymousSimCards</span></a> under utterly <a href="https://infosec.space/tags/cyberfacist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberfacist</span></a> &amp; <a href="https://infosec.space/tags/FalsePretenses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FalsePretenses</span></a>!</li></ul><p>Add to that the <em>regression</em> in flexibility: </p><p>Unlike a <a href="https://infosec.space/tags/SimCard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SimCard</span></a> which was designed as a <em>vendor-independent, <a href="https://infosec.space/tags/MultiVendor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MultiVendor</span></a>, <a href="https://infosec.space/tags/MultiProvider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MultiProvider</span></a>, device agnostic unit to facilitate the the <a href="https://infosec.space/tags/authentification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentification</span></a> and <a href="https://infosec.space/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> in <a href="https://infosec.space/tags/GSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSM</span></a> (and successor standards)</em>, <a href="https://infosec.space/tags/eSIMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIMs</span></a> act to restrict <a href="https://infosec.space/tags/DeviceFreedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeviceFreedom</span></a> and <a href="https://infosec.space/tags/ConsumerChoice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConsumerChoice</span></a>, which with shit like <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KYC</span></a> per <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a> (i.e. <a href="https://infosec.space/tags/Turkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Turkey</span></a> demands it after 90 days of roaming per year) und <a href="https://infosec.space/tags/lMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lMEI</span></a>-based <a href="https://infosec.space/tags/Allowlisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Allowlisting</span></a> (see <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>'s shitty <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> + <a href="https://infosec.space/tags/2G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2G</span></a> &amp; <a href="https://infosec.space/tags/3G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>3G</span></a> shutdown!) are just acts to clamp down on <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://infosec.space/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>.</p><ul><li>And with <a href="https://infosec.space/tags/EID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EID</span></a> being unique per <a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> (like the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a> on top!) there's nothing stopping <a href="https://infosec.space/tags/cyberfacist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberfacist</span></a> regimes like <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>, <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>, <a href="https://infosec.space/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a>, ... from banning <em>"<a href="https://infosec.space/tags/eSIMcards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIMcards</span></a>"</em> (<a href="https://infosec.space/tags/eSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSIM</span></a> in SIM card form factor) or entire device prefixes (i.e. all phones that are supported by <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> ), as M(V)NOs see the EID used to deploy/activate a profile (obviously they don't want people to activate eSIMs more than once, <em>unless explicitly allowed otherwise</em>.</li></ul><p>"[…] [Technologies] must <em>always</em> be evaluated for their ability to oppress. […] </p><ul><li>Dan Olson</li></ul><p>And now you know why I consider a <a href="https://infosec.space/tags/smartphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smartphone</span></a> with eSIM instead of two SIM slots not as a <em>real</em> <a href="https://infosec.space/tags/DualSIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualSIM</span></a> device because it restricts my ability to freely move devices.</p><ul><li>And whilst German Courts reaffirmed §77 TKG (Telco Law)'s mandate to letting people choose their devices freely, (by declarong <a href="https://infosec.space/tags/fees" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fees</span></a> for reissue of eSIMs illegal) that is only <em>enforceable towards M(V)NOs who are in <a href="https://infosec.space/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a></em>, so <em>'good luck'</em> trying to enforce that against some overseas roaming provider.</li></ul><p>Thus <a href="https://infosec.space/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> attacks in GSM-based networks are easier than ever before which in the age of <em>more skilled than ever</em> <a href="https://infosec.space/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> and <a href="https://infosec.space/tags/Cyberterrorists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberterrorists</span></a> (i.e. <a href="https://infosec.space/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> &amp; <a href="https://infosec.space/tags/Roskomnadnozr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roskomnadnozr</span></a>) puts espechally the average <em><a href="https://infosec.space/tags/TechIlliterate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterate</span></a> User</em> at risk.</p><ul><li>I mean, anyone else remember the <a href="https://infosec.space/tags/Kiddies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kiddies</span></a> that <em>fucked around</em> with <a href="https://infosec.space/tags/CIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIA</span></a> director <a href="https://infosec.space/tags/Brennan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Brennan</span></a>? Those were just using their <em>"weapons-grade <a href="https://infosec.space/tags/boredom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>boredom</span></a>"</em>, not being effective, for-profit cyber criminals!</li></ul><p>And then think about those who don't have <em>privilegued access</em> to <em>protection</em> by their government, but rather <em>"privilegued access" to prosecution</em> by the state <em>because their very existance is criminalized...</em></p> <p>The only advantage eSIMs broight in contrast is <em>'logistical' convenience</em> because it's mostly a <a href="https://infosec.space/tags/QRcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QRcode</span></a> and that's just a way to avoid typos on a cryptic <a href="https://infosec.space/tags/LocalProfileAgent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalProfileAgent</span></a> link.</p>
Bo Flecks<p>Millions of people spied on by malicious browser extensions in <a href="https://social.vivaldi.net/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> and <a href="https://social.vivaldi.net/tags/Edge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Edge</span></a> | Malwarebytes<br>"...when an <a href="https://social.vivaldi.net/tags/extension" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extension</span></a> has been available in the web store for a while, <a href="https://social.vivaldi.net/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> can insert <a href="https://social.vivaldi.net/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> code through updates to the extension. Some researchers refer to the clean extensions as “sleeper agents.” </p><p><a href="https://www.malwarebytes.com/blog/news/2025/07/millions-of-people-spied-on-by-malicious-browser-extensions-in-chrome-and-edge" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/news/202</span><span class="invisible">5/07/millions-of-people-spied-on-by-malicious-browser-extensions-in-chrome-and-edge</span></a></p>
IT News<p>“No honor among thieves”: M&amp;S hacking group starts turf war - The ransomware group linked to the recent cyberattacks on UK... - <a href="https://arstechnica.com/security/2025/07/no-honor-among-thieves-ms-hacking-group-starts-turf-war/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/no-honor-among-thieves-ms-hacking-group-starts-turf-war/</span></a> <a href="https://schleuss.online/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://schleuss.online/tags/syndication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syndication</span></a> <a href="https://schleuss.online/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://schleuss.online/tags/extortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extortion</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
PrivacyDigest<p>A Group of Young <a href="https://mas.to/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> Poses the ‘Most Imminent Threat’ of <a href="https://mas.to/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> Right Now</p><p>The <a href="https://mas.to/tags/ScatteredSpider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScatteredSpider</span></a> <a href="https://mas.to/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> group has caused chaos among retailers, insurers, and airlines in recent months. Researchers warn that its flexible structure poses challenges for defense.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://www.wired.com/story/scattered-spider-most-imminent-threat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/scattered-spid</span><span class="invisible">er-most-imminent-threat/</span></a></p>
Pyrzout :vm:<p>Cybersecurity Must Lead, Not Lag, ASEAN’s Digital Transformation <a href="https://thecyberexpress.com/asean-digital-growth-cybersecurity-risks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/asean-digi</span><span class="invisible">tal-growth-cybersecurity-risks/</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/AIdeployments" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIdeployments</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/Features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Features</span></a> <a href="https://social.skynetcloud.site/tags/ASEAN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASEAN</span></a></p>
Steve Dustcircle 🌹<p><a href="https://mastodon.social/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> are abusing <a href="https://mastodon.social/tags/LLMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMs</span></a> to help them with <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> activities</p><p><a href="https://www.techradar.com/pro/security/cybercriminals-are-abusing-llms-to-help-them-with-hacking-activities" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/cyb</span><span class="invisible">ercriminals-are-abusing-llms-to-help-them-with-hacking-activities</span></a></p>
Pyrzout :vm:<p>Money mule networks evolve into hierarchical, business-like criminal enterprises <a href="https://www.helpnetsecurity.com/2025/06/27/michal-tresner-threatmark-money-mule-networks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/27</span><span class="invisible">/michal-tresner-threatmark-money-mule-networks/</span></a> <a href="https://social.skynetcloud.site/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://social.skynetcloud.site/tags/identityverification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identityverification</span></a> <a href="https://social.skynetcloud.site/tags/financialindustry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>financialindustry</span></a> <a href="https://social.skynetcloud.site/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/ThreatMark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatMark</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Features</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraud</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.omada.cafe/@fluffery" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluffery</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@maumau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maumau</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> yeah, and that <em>is</em> a big problem!</p><p>Not to mention <a href="https://infosec.space/tags/ValueRemiving" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ValueRemiving</span></a> <a href="https://infosec.space/tags/Rentseekers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rentseekers</span></a> &amp; <a href="https://infosec.space/tags/RogueISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueISP</span></a>|s like <a href="https://infosec.space/tags/ClownFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClownFlare</span></a> &amp; their business models should not exist do begin with.</p><ul><li>Simply because <a href="https://infosec.space/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> hosts the very same <a href="https://infosec.space/tags/CyberCriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCriminals</span></a>' infrastructure, making them a two-headed <a href="https://infosec.space/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> of not <a href="https://infosec.space/tags/RacoeteeringScheme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RacoeteeringScheme</span></a> if we don't categorize them as <a href="https://infosec.space/tags/RogueISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueISP</span></a>!</li></ul>
Steve Dustcircle 🌹<p><a href="https://masto.ai/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> are targeting <a href="https://masto.ai/tags/gamers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gamers</span></a> with expired <a href="https://masto.ai/tags/Discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Discord</span></a> <a href="https://masto.ai/tags/invitelinks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>invitelinks</span></a> which redirect to <a href="https://masto.ai/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> servers - here's how to stay safe</p><p><a href="https://www.techradar.com/pro/security/cybercriminals-are-targeting-gamers-with-expired-discord-invite-links-that-redirect-to-malware-servers-heres-how-to-stay-safe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/cyb</span><span class="invisible">ercriminals-are-targeting-gamers-with-expired-discord-invite-links-that-redirect-to-malware-servers-heres-how-to-stay-safe</span></a></p>
beSpacific<p>Via <a href="https://newsie.social/tags/LLRX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLRX</span></a> - <span class="h-card" translate="no"><a href="https://newsie.social/@psuPete" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>psuPete</span></a></span> Recommends – Weekly highlights on cyber security issues, June 15, 2025. <a href="https://www.llrx.com/2025/06/pete-recommends-weekly-highlights-on-cyber-security-issues-june-15-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">llrx.com/2025/06/pete-recommen</span><span class="invisible">ds-weekly-highlights-on-cyber-security-issues-june-15-2025/</span></a><br>Four highlights from this week: Protect Yourself <a href="https://newsie.social/tags/Online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Online</span></a>; Study: <a href="https://newsie.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> Has Been <a href="https://newsie.social/tags/Breached" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Breached</span></a> More Than 1000 Times; <a href="https://newsie.social/tags/Feds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Feds</span></a> warn: Hang up on <a href="https://newsie.social/tags/phone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phone</span></a> <a href="https://newsie.social/tags/scammers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scammers</span></a> pretending to be <a href="https://newsie.social/tags/borderpatrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>borderpatrol</span></a> agents; and <a href="https://newsie.social/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> Are Hiding <a href="https://newsie.social/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a> <a href="https://newsie.social/tags/Web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Web</span></a> Traffic in Plain Sight. <a href="https://newsie.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://newsie.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://newsie.social/tags/breaches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breaches</span></a> <a href="https://newsie.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://newsie.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a></p>
Pyrzout :vm:<p>Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware <a href="https://gbhackers.com/cybercriminals-exploiting-expired-discord-invite-links/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/cybercriminals-e</span><span class="invisible">xploiting-expired-discord-invite-links/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Discord</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Pyrzout :vm:<p>LockBit panel data leak shows Chinese orgs among the most targeted <a href="https://www.helpnetsecurity.com/2025/06/12/lockbit-data-leak-targets-ransoms/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/12</span><span class="invisible">/lockbit-data-leak-targets-ransoms/</span></a> <a href="https://social.skynetcloud.site/tags/PositiveTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PositiveTechnologies</span></a> <a href="https://social.skynetcloud.site/tags/manufacturingsector" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manufacturingsector</span></a> <a href="https://social.skynetcloud.site/tags/RussianFederation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussianFederation</span></a> <a href="https://social.skynetcloud.site/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.skynetcloud.site/tags/Taiwan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taiwan</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminals</span></a> Are Hiding <a href="https://mas.to/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a> Web Traffic in Plain Sight </p><p>In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mas.to/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> </p><p><a href="https://www.wired.com/story/cybercriminals-are-hiding-malicious-web-traffic-in-plain-sight/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/cybercriminals</span><span class="invisible">-are-hiding-malicious-web-traffic-in-plain-sight/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://soc.megatokyo.moe/users/wyatt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>wyatt</span></a></span> the only people that like <em>"<a href="https://infosec.space/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>"</em>, <em>"<a href="https://infosec.space/tags/DeFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeFi</span></a>"</em> and <a href="https://infosec.space/tags/Shitcoins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shitcoins</span></a> like <a href="https://infosec.space/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitcoin</span></a> and <a href="https://infosec.space/tags/Ethereum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethereum</span></a> are <a href="https://infosec.space/tags/fraudsters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraudsters</span></a>, <a href="https://infosec.space/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> and antisocial rentseekers!</p>
Pyrzout :vm:<p>How global collaboration is hitting cybercriminals where it hurts <a href="https://www.helpnetsecurity.com/2025/06/03/william-lyne-national-crime-agency-cybercrime-ecosystem-threats/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/03</span><span class="invisible">/william-lyne-national-crime-agency-cybercrime-ecosystem-threats/</span></a> <a href="https://social.skynetcloud.site/tags/NationalCrimeAgency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationalCrimeAgency</span></a> <a href="https://social.skynetcloud.site/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://social.skynetcloud.site/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/lawenforcement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawenforcement</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Features</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a></p>
DARLENE RYAN 🇨🇦<p>Defying <a href="https://mastodon.social/tags/CyberCriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCriminals</span></a> <a href="https://mastodon.social/tags/CanadianSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CanadianSecurity</span></a> 🇨🇦</p><p><a href="https://www.linkedin.com/posts/safety-canada-securite-canada_cyber-criminals-will-often-create-spoofed-activity-7333891185226244096-buRd?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAFTmVW0Bk4A36zPeIECJtdGzAs7NOQIWT3Y" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/safety-cana</span><span class="invisible">da-securite-canada_cyber-criminals-will-often-create-spoofed-activity-7333891185226244096-buRd?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAFTmVW0Bk4A36zPeIECJtdGzAs7NOQIWT3Y</span></a></p>