#securityops — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #securityops, aggregated by home.social.
-
Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.
Technique observed:
• Automated voice phishing (vishing)
• Fear-based social engineering
• Real-time OTP interception
• Credential resale & fraud enablementThe case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.
Security professionals - is it time to deprecate SMS-based MFA entirely?
Engage in the discussion below.
Follow @technadu for actionable threat intelligence.#InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps
-
Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.
Technique observed:
• Automated voice phishing (vishing)
• Fear-based social engineering
• Real-time OTP interception
• Credential resale & fraud enablementThe case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.
Security professionals - is it time to deprecate SMS-based MFA entirely?
Engage in the discussion below.
Follow @technadu for actionable threat intelligence.#InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps
-
Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.
Technique observed:
• Automated voice phishing (vishing)
• Fear-based social engineering
• Real-time OTP interception
• Credential resale & fraud enablementThe case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.
Security professionals - is it time to deprecate SMS-based MFA entirely?
Engage in the discussion below.
Follow @technadu for actionable threat intelligence.#InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps
-
Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.
Technique observed:
• Automated voice phishing (vishing)
• Fear-based social engineering
• Real-time OTP interception
• Credential resale & fraud enablementThe case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.
Security professionals - is it time to deprecate SMS-based MFA entirely?
Engage in the discussion below.
Follow @technadu for actionable threat intelligence.#InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps
-
👾 Digital Threats Don’t Knock — They Breach.
Most companies patch holes.
Hacktivate Labs builds digital shields before the attack even happens.🧠 Your firewall isn’t your defense.
Your people are. Train them like operators — not employees.The next workforce won’t just use AI…
They’ll secure it, fortify it, and harden every endpoint in the network.⚠️ If your team isn’t security-trained —
your infrastructure is already exposed.This is your warning shot.
Welcome to the era of cyber intelligence.#HacktivateLabs #SecurityOps #NetworkSecurity #AIIntegrity #CyberWorkforce #KillTheBreach
-
AI is becoming central to security operations. Let's talk about why. 👇
AI-assisted workflows are on the rise. ⬆️ And, when an algorithm highlights a critical #security event, analysts need to understand why that happened. Without true visibility, this #AI assistance risks creating new blind spots and hiding important context, rather than leading to a solution. 😓
To make sense of the constant overflow of alerts, you need AI capabilities that are built into workflows that you already use, like:
☑️ Behavioral detection
☑️ Risk-based prioritization
☑️ Investigation summaries
☑️ Smarter dashboards and searchLearn how you can leverage these important AI capabilities and stay in control while using tools that accelerate detection, streamline investigations, and strengthen your reporting: https://graylog.org/post/how-graylog-uses-explainable-ai-to-help-security-teams/ #cybersecurity #securityops #security #securityanalyst