Social Engineering Tactics Expose Company's Vulnerability

A simple request from "the boss" was all it took for a threat actor to gain root access to a company's system, exposing a shocking vulnerability in their security - one that was exploited through a clever social engineering tactic. Human IT managers, trying to be helpful, inadvertently handed over the keys to the kingdom.

https://osintsights.com/social-engineering-tactics-expose-companys-vulnerability?utm_source=mastodon&utm_medium=social

#SocialEngineering #HumanError #RootAccess #ThreatActor #EmergingThreats

Social Engineering Tactics Expose Company's Vulnerability

Learn how social engineering tactics exposed a company's vulnerability and take steps to protect your business from similar threats today with expert guidance.

OSINTSights

How many critical services are tied to abominations like #reCAPTCHA and #SafetyNet API? #Banking, #Healthcare, #eCommerce, #PublicServices, #PublicTransport, #RideHailing and even #WeatherServices. What are the implications of every citizen having to seek permissions from a trillion-dollar MNC to access any of them?

Check out #PRISM to see who Google silently shares this data with. #Google is a serious #state_sponsored #ThreatActor against individuals & national #sovereignty.

[3/6]

GitHub Facades Used to Disguise EtherRAT Malware Distribution

Malicious actors have been using 44 cleverly disguised GitHub facades to spread EtherRAT malware, masquerading as legitimate admin and dev tools between December 2025 and April 2026. These fake repositories were designed to manipulate search results, leading victims to download a malicious MSI installer hidden in a second, secret GitHub…

https://osintsights.com/github-facades-used-to-disguise-etherrat-malware-distribution?utm_source=mastodon&utm_medium=social

#MalwareOperations #Github #Etherrat #EmergingThreats #ThreatActor

GitHub Facades Used to Disguise EtherRAT Malware Distribution

Learn how GitHub facades were used to disguise EtherRAT malware distribution and protect your systems now with expert insights and security tips.

OSINTSights

Here are four of the ten looping Claude user quotes on anthropic.com homepage... Mind you, these are not dynamic, they chose these explicitly. Are they trying to represent user sentiment accurately or are they reading these very differently than I am?

I went there after watching this talk: "Nicholas Carlini - Black-hat LLMs", from one of their engineers. There's definitely good work by talented and conscientious people that's going on there.

I'm rewriting this post because I'm cynical of corporate motives but I also don't think that interpreting everything cynically is helpful. Even after the VC funding runs out (hopefully before we destroy the planet and society), these tools won't disappear especially for malicious actors. So if they're also building tooling to mitigate harm / defend against threat actors, do I dare to hope they're reading the quotes the same way I am? Or is it more of:

I feel like I'm creating more dependency than knowledge.

#AI #Anthropic #Claude #Blackhat #LLM #SoftwareSecurity #Cybersecurity #ThreatActor

Hey Fediverse, especially folks that working in infosec or cybersecurity field.

Several years ago, I remember that Microsoft added a new Threat Actor in their classification list for Britain based APT.

I tried to search again, but I didn't find anything anymore regarding this.

Anyone has any pointer?

#Fediverse
#Infosec
#Cybersecurity
#ThreatActor
#APT
#ThreatIntel

The Rise and Fall of SiegedSec - Flare

SiegedSec was a black hat hacktivist group created in April 2022 that had multiple breaches and disbandments over the years.

Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime

🚨 0xy0um0m Databases — Alleged Data Breach

Actor "0xy0um0m" claims 0m records exposed
📋 Account balances, Browser user agent details, Dates of birth

⚠️ Unverified dark web claim — not independently confirmed.

Full analysis:
https://www.yazoul.net/intel/claim/2026-03-13-massive-0xy0um0m-database-collection-allegedly-leaks-52-5-million-records

#CyberSecurity #ThreatActor #OSINT

Critical: Massive 0xy0um0m Database Collection Allegedly Leaks 52.5 Million Records | Yazoul Intel

Critical severity: 0xy0um0m Databases allegedly breached by 0xy0um0m. 0m records claimed. Allegedly exposed: Account balances, Browser user agent details, Dates of birth.

Yazoul Security

🚨 Mutuelle Des Motards — Alleged Data Breach

Actor "aaa" claims 1.3 million records exposed
📋 Email addresses, Names, Phone numbers

⚠️ Unverified dark web claim — not independently confirmed.

Full analysis:
https://www.yazoul.net/intel/claim/2026-03-12-mutuelle-des-motards-insurance-database-allegedly-leaked-1-3-million-records

#CyberSecurity #ThreatActor #OSINT

High: Mutuelle Des Motards Insurance Database Allegedly Leaked - 1.3 Million Records | Yazoul Intel

High severity: Mutuelle Des Motards allegedly breached by aaa. 1.3 million records claimed. Allegedly exposed: Email addresses, Names, Phone numbers.

Yazoul Security

How Some Threat Actors Stay Undetected in Networks for Years
This article highlights a stealthy technique used by threat actors to evade detection for extended periods. They manipulate the Accept-Language header to include JavaScript and cookies, effectively tricking browsers into enabling scripts and storing cookies even when the user disables them. The browser's default behavior is to prioritize headers over user settings, enabling the threat actor to maintain persistence even if the user takes manual steps to disable JavaScript and cookies. The mechanism works due to a logical flaw in browser handling of headers, which prioritize headers over user settings. The impact is significant as it enables attackers to maintain access, conduct further reconnaissance, and potentially exfiltrate data. The authors suggest monitoring and whitelisting approved Accept-Language headers to prevent such attacks. Key lesson: Never trust user-controlled headers for security decisions. #BugBounty #WebSecurity #StealthTechnique #ThreatActor #HeaderManipulation

https://medium.com/@paritoshblogs/how-some-threat-actors-stay-undetected-in-networks-for-years-6a40f28d2d2c?source=rss------bug_bounty-5

How Some Threat Actors Stay Undetected in Networks for Years

One of the most fascinating aspects of modern cyber espionage is not the breach itself — but how long attackers can quietly remain inside…

Medium