mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.3K
active users

#credentialtheft

0 posts0 participants0 posts today
LMG Security<p>Microsoft 365 credential theft is evolving quickly!</p><p>Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.</p><p>Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.</p><p>Watch now to learn:</p><p>▪ How Copilot can be used against you<br>▪ Real phishing tactics mimicking Microsoft 365, Adobe &amp; DocuSign<br>▪ Why SSO, OAuth, and poor access controls can make attacks worse<br>▪ What your organization must do to stay ahead</p><p>Watch the video! <a href="https://youtu.be/zaBwxy1Gjhc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zaBwxy1Gjhc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CoPilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CoPilot</span></a> <a href="https://infosec.exchange/tags/ZeroTr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTr</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/Riskmanageemnt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Riskmanageemnt</span></a></p>
Bruce Sterling @bruces<p>*Politically hacking the smart toilet screens in the resort-town airport. <a href="https://mastodon.social/tags/InternetOfThings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetOfThings</span></a> <a href="https://mastodon.social/tags/credentialtheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credentialtheft</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/digitaloutsideofhome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaloutsideofhome</span></a> <a href="https://mastodon.social/tags/TwentyTwenties" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TwentyTwenties</span></a> </p><p><a href="https://thethaiger.com/news/phuket/phuket-airport-scrambles-to-explain-cyberattack-on-digital-screen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thethaiger.com/news/phuket/phu</span><span class="invisible">ket-airport-scrambles-to-explain-cyberattack-on-digital-screen</span></a></p>
Ian Barker<p>Credential theft escalates as threat actors use stealthier tactics <a href="https://newsie.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://newsie.social/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialTheft</span></a></p><p><a href="https://betanews.com/2025/04/17/credential-theft-escalates-as-threat-actors-use-stealthier-tactics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">betanews.com/2025/04/17/creden</span><span class="invisible">tial-theft-escalates-as-threat-actors-use-stealthier-tactics/</span></a></p>

The Register: Supply chain attack hits Chrome extensions, could expose millions. “Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that has potentially impacted hundreds of thousands of individuals already. Dozens of Chrome extension developers have fallen victim to the attacks thus far, which aimed to lift API keys, session […]

https://rbfirehose.com/2025/01/24/the-register-supply-chain-attack-hits-chrome-extensions-could-expose-millions/

ResearchBuzz: Firehose | Individual posts from ResearchBuzz · The Register: Supply chain attack hits Chrome extensions, could expose millions | ResearchBuzz: Firehose
More from ResearchBuzz: Firehose

🚨 Security Alert! 🚨 A recent attack has compromised 16 Chrome extensions, exposing over 600,000 users to data theft! 🛡️ Cyberhaven was among the first affected, with malicious code stealing sensitive information. This highlights the vulnerabilities of browser extensions. Stay safe and review your installed extensions! 🔍✨ #CyberSecurity #ChromeExtensions #DataProtection #PhishingAttack #CredentialTheft thehackernews.com/2024/12/16-c #newz

A new Fortinet VPN zero-day vulnerability is being exploited by a toolkit called 'DeepData'. The #security gap allows credential dumping from memory after authentication. Until a patch is available, you should restrict VPN access and monitor for unusual login activity. IOCs are available in this article: bleepingcomputer.com/news/secu

BleepingComputer · Chinese hackers exploit Fortinet VPN zero-day to steal credentialsBy Bill Toulas