home.social

#securityops — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #securityops, aggregated by home.social.

  1. Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.

    Technique observed:
    • Automated voice phishing (vishing)
    • Fear-based social engineering
    • Real-time OTP interception
    • Credential resale & fraud enablement

    The case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.

    Security professionals - is it time to deprecate SMS-based MFA entirely?

    Engage in the discussion below.
    Follow @technadu for actionable threat intelligence.

    #InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps

  2. Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.

    Technique observed:
    • Automated voice phishing (vishing)
    • Fear-based social engineering
    • Real-time OTP interception
    • Credential resale & fraud enablement

    The case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.

    Security professionals - is it time to deprecate SMS-based MFA entirely?

    Engage in the discussion below.
    Follow @technadu for actionable threat intelligence.

    #InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps

  3. Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.

    Technique observed:
    • Automated voice phishing (vishing)
    • Fear-based social engineering
    • Real-time OTP interception
    • Credential resale & fraud enablement

    The case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.

    Security professionals - is it time to deprecate SMS-based MFA entirely?

    Engage in the discussion below.
    Follow @technadu for actionable threat intelligence.

    #InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps

  4. Dutch police arrested a suspect linked to JokerOTP - a bot engineered to automate OTP harvesting and bypass SMS-based 2FA protections.

    Technique observed:
    • Automated voice phishing (vishing)
    • Fear-based social engineering
    • Real-time OTP interception
    • Credential resale & fraud enablement

    The case reinforces a persistent issue: OTP over SMS remains highly vulnerable to social engineering workflows.

    Security professionals - is it time to deprecate SMS-based MFA entirely?

    Engage in the discussion below.
    Follow @technadu for actionable threat intelligence.

    #InfoSec #MFA #TwoFactorAuthentication #Vishing #CyberCrime #ThreatIntelligence #Fraud #IdentityTheft #CyberDefense #BlueTeam #SecurityOps

  5. 👾 Digital Threats Don’t Knock — They Breach.
    Most companies patch holes.
    Hacktivate Labs builds digital shields before the attack even happens.

    🧠 Your firewall isn’t your defense.
    Your people are. Train them like operators — not employees.

    The next workforce won’t just use AI…
    They’ll secure it, fortify it, and harden every endpoint in the network.

    ⚠️ If your team isn’t security-trained —
    your infrastructure is already exposed.

    This is your warning shot.
    Welcome to the era of cyber intelligence.

    #HacktivateLabs #SecurityOps #NetworkSecurity #AIIntegrity #CyberWorkforce #KillTheBreach

  6. AI is becoming central to security operations. Let's talk about why. 👇

    AI-assisted workflows are on the rise. ⬆️ And, when an algorithm highlights a critical #security event, analysts need to understand why that happened. Without true visibility, this #AI assistance risks creating new blind spots and hiding important context, rather than leading to a solution. 😓

    To make sense of the constant overflow of alerts, you need AI capabilities that are built into workflows that you already use, like:
    ☑️ Behavioral detection
    ☑️ Risk-based prioritization
    ☑️ Investigation summaries
    ☑️ Smarter dashboards and search

    Learn how you can leverage these important AI capabilities and stay in control while using tools that accelerate detection, streamline investigations, and strengthen your reporting: graylog.org/post/how-graylog-u #cybersecurity #securityops #security #securityanalyst