eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

215
active users

#credentialtheft

0 posts0 participants0 posts today
LMG Security<p>Microsoft 365 credential theft is evolving quickly!</p><p>Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.</p><p>Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.</p><p>Watch now to learn:</p><p>▪ How Copilot can be used against you<br>▪ Real phishing tactics mimicking Microsoft 365, Adobe &amp; DocuSign<br>▪ Why SSO, OAuth, and poor access controls can make attacks worse<br>▪ What your organization must do to stay ahead</p><p>Watch the video! <a href="https://youtu.be/zaBwxy1Gjhc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zaBwxy1Gjhc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CoPilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CoPilot</span></a> <a href="https://infosec.exchange/tags/ZeroTr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTr</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/Riskmanageemnt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Riskmanageemnt</span></a></p>
Bruce Sterling @bruces<p>*Politically hacking the smart toilet screens in the resort-town airport. <a href="https://mastodon.social/tags/InternetOfThings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetOfThings</span></a> <a href="https://mastodon.social/tags/credentialtheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credentialtheft</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/digitaloutsideofhome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaloutsideofhome</span></a> <a href="https://mastodon.social/tags/TwentyTwenties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TwentyTwenties</span></a> </p><p><a href="https://thethaiger.com/news/phuket/phuket-airport-scrambles-to-explain-cyberattack-on-digital-screen" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thethaiger.com/news/phuket/phu</span><span class="invisible">ket-airport-scrambles-to-explain-cyberattack-on-digital-screen</span></a></p>
G :donor: :Tick:<p>I iz in ur logicappz, stealin ur secretz <a href="https://infosec.exchange/tags/SilentReaper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SilentReaper</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/VulnNotVuln" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnNotVuln</span></a> <a href="https://infosec.exchange/tags/DataExfiltration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataExfiltration</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p><p>Blog: <a href="https://cirriustech.co.uk/blog/azure-silent-reaper/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cirriustech.co.uk/blog/azure-s</span><span class="invisible">ilent-reaper/</span></a><br>Tools: <a href="https://github.com/Az-Skywalker/Az-Skywalker" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Az-Skywalker/Az-Sky</span><span class="invisible">walker</span></a></p>
Paul Shread<p>A cloud vulnerability a lot of people apparently don't know about: .env files contain secrets such as hard-coded cloud access keys, and not configuring them properly can lead to very bad things. <br><a href="https://masto.ai/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://masto.ai/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://masto.ai/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://masto.ai/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://masto.ai/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://masto.ai/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://masto.ai/tags/CloudStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudStorage</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/AttackSurfaceManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AttackSurfaceManagement</span></a> <a href="https://masto.ai/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a> </p><p><a href="https://thecyberexpress.com/cloud-extortion-campaign-hacks-aws-env-files/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/cloud-exto</span><span class="invisible">rtion-campaign-hacks-aws-env-files/</span></a></p>