Phishing ist das Techno unter den Betrugsmaschen: laut, extrem, effektiv. 🪩🎣
Mit Fake-Mails, DMs & QR-Codes wollen Betrüger eure Daten.

Deswegen:
🛑 Klickt nicht jeden Link.
🔗 Vertraut nur offiziellen Quellen.
💡 Folgt diesen und weiteren Tipps hier bei uns.

#Phishing #CyberAwareness #BSI

The Instagram star “Babydoll Archi” was an AI deepfake built from a stolen photo, say police. The case exposes how quickly non-consensual content can go viral—& profitable. Talk about consent. Learn to report. Don’t reshare.
#BabydollArchi #ArchitaPhukan #DeepfakeAlert #OnlineSafety #StopRevengePorn #CyberAwareness #IndiaDigital

https://news24media.org/what-babydoll-archis-viral-fame-says/

What Babydoll Archi’s Viral Fame Says About India’s Porn Problem—And the Dark Economics of AI Deepfakes - News 24 Media

A glossy Instagram influencer named “Babydoll Archi” rocketed past 1.4 million followers, won a blue tick, and even appeared to rub digital shoulders with global adult stars. Then, investigators revealed a shocking truth: she didn’t exist.

News 24 Media

🎙️ Catching Up With Ken Munro After Infosecurity Europe 2025 — Hack the Planet, One System at a Time

This is our final On Location episode from Infosecurity Europe 2025, and I couldn’t think of a better way to wrap it than with Ken Munro of Pen Test Partners — a conversation that dives into real-world #hacking: from vehicles to planes to critical infrastructure, and why tangible, hands-on security education matters more than ever.

▶️ Watch the Video: https://youtu.be/5hgs01-RzjM?si=K0b9HQnAidbRgQpa

🎧 Listen to the Podcast: https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/catching-up-with-ken-munro-after-infosecurity-europe-2025-hacking-the-planet-one-car-one-plane-and-one-system-at-a-time

As we close the London chapter, we now go full throttle into Black Hat USA — our next stop for on-location coverage.

If your company wants to join the ITSPmagazine coverage with a sponsored podcast or executive briefing, now’s the time.

Only a few spots left.

Book here https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas

Or DM me or Sean Martin, CISSP Martin if you want in.

#HackThePlanet #InfosecurityEurope #BlackHatUSA #Cybersecurity #PenTestPartners #OnLocation #Podcast #ITSPmagazine #SecurityLeadership #CyberAwareness #HackerMindset #DefconVibes #infosec2025

Catching Up With Ken Munro — Hacking the Planet, One Car, One Plane, and One System at a Time

YouTube

Projekt SOS: Sekurak o Security wystartował. Bezpłatny kurs cyberbezpieczeństwie – dla wszystkich pracowników biurowych :-)

Wakacje to czas odpoczynku, ale czy nie warto przy okazji zadbać o swoje bezpieczeństwo w sieci? Wychodzimy do Was z taką inicjatywą specjalnie na lato: projektem SOS (Sekurak O Security) – wakacyjnym kursem cyberbezpieczeństwa, który jest krótki, konkretny i… całkowicie za darmol! Jeżeli chcesz zrozumieć, jakie zagrożenia czyhają na Ciebie...

#Aktualności #Cyberawareness #Newsletter #SekurakOSecurity #Sos #Szkolenia #Wakacje

https://sekurak.pl/projekt-sos-sekurak-o-security-wystartowal-zobacz-co-dla-ciebie-przygotowalismy/

Projekt SOS: Sekurak o Security wystartował. Bezpłatny kurs cyberbezpieczeństwie - dla wszystkich pracowników biurowych :-)

Wakacje to czas odpoczynku, ale czy nie warto przy okazji zadbać o swoje bezpieczeństwo w sieci? Wychodzimy do Was z taką inicjatywą specjalnie na lato: projektem SOS (Sekurak O Security) – wakacyjnym kursem cyberbezpieczeństwa, który jest krótki, konkretny i… całkowicie za darmol! Jeżeli chcesz zrozumieć, jakie zagrożenia czyhają na Ciebie...

Sekurak

🚨 ClickFix = CAPTCHA + Malware

Rhadamanthys infostealer is back, this time hiding behind fake “verify” prompts that run PowerShell.

No macros. No attachments.
👀 SMEs are targets.
#CyberSecurity #ClickFix #Rhadamanthys #PaxionCyber #SMBSecurity #CyberAwareness

🔐 Top 5 Cybersecurity Threats Facing SMBs in 2025 🚨

Small & Medium Businesses are now prime targets for cybercriminals.

From AI-powered phishing to ransomware-as-a-service, the threats are smarter, faster, and more devastating than ever before.

Read the full guide 👉 https://wardenshield.com/top-5-cybersecurity-threats-facing-small-and-medium-businesses-smbs-in-2025

#cybersecurity #smallbusinesstips #SMBs #ransomware #phishing #CyberThreats2025 #infosec #wardenshield #dataprotection #CyberAwareness #AI #AIThreats #BusinessSecurity #cybercrime #digitalrisk #TechForSMBs

Top 5 Cybersecurity Threats Facing Small and Medium Businesses (SMBs) in 2025 | WardenShield

Explore the top 5 cybersecurity threats facing SMBs in 2025: AI-driven phishing, ransomware 2.0, supply chain attacks, insider threats, and cloud/IoT vulnerabilities. Packed with stats and mitigation strategies, leveraging WardenShield’s expertise to protect businesses from evolving cyber risks.

WardenShield

A former student hacked WSU for discounted parking and escalated it into a 100GB data heist impacting 10,000 people. What went wrong, and how can educational institutions safeguard against such breaches? Dive into the cybersecurity lessons from this case.

https://thedefendopsdiaries.com/cybersecurity-in-education-lessons-from-the-wsu-hacking-case/

#cybersecurity
#educationsecurity
#databreach
#infosec
#cyberawareness

Cybersecurity in Education: Lessons from the WSU Hacking Case

Explore the WSU hacking case and its lessons for enhancing cybersecurity in educational institutions.

The DefendOps Diaries
Websites Are Tracking You Via Browser Fingerprinting

New research provides first evidence of the use of browser fingerprints for online tracking.

Explore how botnets operate—from infected “zombie” devices to the shadowy command-and-control (C2) centers that orchestrate massive cyberattacks. This episode uncovers the architecture, evolution, and real-world impacts of botnet-driven threats, plus how organizations can defend against them.

#CyberSecurity #Botnets #CyberThreats #C2Servers #MalwareAnalysis
#InfoSecPodcast #CyberAwareness

https://castbox.fm/vi/791376831

Botnets Breakdown: From Zombies to Command Centers

<p>In this gripping episode, we dive into the hidden world of botnets—massive networks of hijacked devices controlled by cybercriminals. These digital a...

Castbox