photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

239
active users

#socialengineering

4 posts4 participants0 posts today

Clorox got cleaned out by hackers who discovered the ultimate cheat code: polite phone conversation 🧽

Their $380M breach happened because Cognizant's help desk handed over passwords to anyone who asked nicely - twice! No verification required.

Sometimes the most "sophisticated" attacks are just good manners.

yro.slashdot.org/story/25/07/2

Seriously? WTF?

“Cognizant was not duped by any elaborate ploy or sophisticated hacking techniques,” according to a copy of the lawsuit reviewed by Reuters. “The cybercriminal just called the Cognizant Service Desk, asked for credentials to access Clorox’s network, and Cognizant handed the credentials right over.”

nbcnews.com/business/business-

NBC News · Lawsuit says Clorox hackers got passwords simply by askingBy Reuters

DATE: July 08, 2025 at 11:59AM
SOURCE: HIPAA JOURNAL

Direct article link at end of text block below.

Compumedics Cyberattack Affects Almost a Dozen Healthcare Providers t.co/hp9XBcn3Es #healthcare #databreach

Articles can be found by scrolling down the page at hipaajournal.com/ .

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Most healthcare security and privacy posts related to IT or infosec are at @rsstosecurity

-------------------------------------------------

Deepfake Danger: FBI Issues Urgent Warning on AI Voice Attacks

Since April, cybercriminals have been using AI-generated voice deepfakes to impersonate senior U.S. officials in phishing attacks that target current and former government personnel.

The FBI’s latest alert warns of growing threats from vishing (voice phishing) and smishing (SMS phishing), where attackers use cloned voices and fake texts to build trust, then trick victims into handing over sensitive data or access.

One tactic? Sending links that move the conversation to other messaging platforms, then hijacking accounts to target additional contacts.

You can't assume messages or even video calls are real these days, so always verify sensitive requests through another known communications channel! These attacks underscore the need for stronger verification protocols, staff training, and multi-layered defenses. Contact us if you need help implementing these proactive cybersecurity controls.

Read the full article: bleepingcomputer.com/news/secu

The rise of Agentic AI has opened new frontiers for adversaries looking to automate and scale social engineering attacks. We are entering a phase where Agentic AI systems will be able act autonomously, make decisions, adapt based on feedback, and complete goal-oriented operations with minimal human intervention.

I wrote an article explaining what Agentic AI really is, and how it can shape the future of social engineering attacks. ⬇️

christina-lekati.medium.com/wh

State-sponsored threat actors often leverage techniques first developed and deployed by cybercriminal actors. One example is #ClickFix, a highly effective technique that involves clever #socialengineering.

Listen as Proofpoint threat research experts Selena Larson, Sarah Sabotka, and Saher Naumaan deep dive into how modern #espionage and #cybercrime are increasingly blurring lines.

Stream DISCARDED now:
Apple Podcasts: brnw.ch/21wSNbM
Spotify: brnw.ch/21wSNbL
Web player: brnw.ch/21wSNbN