fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#cybercriminals

2 posts2 participants0 posts today
Continued thread

Beginning around 2022, while still in high school, #Coristine ran a company called DiamondCDN that provided network services, acc/to corporate & digital records reviewed by Reuters & interviews w/half a dozen fmr associates. Among its users was a website run by a ring of #cybercriminals operating under the name "EGodly," acc/to digital records preserved by the internet intelligence firm DomainTools & the online #cybersecurity tool Any.Run.

Many industrial facilities now rely on interconnected systems to improve operations. 👍 However, when previously isolated Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are connected to public internet-facing applications it creates new #cybersecurity risk. ⚠️ To protect ICS and SCADA systems from cyber threats, it's important to understand how these technologies fit into your environment and why #cybercriminals target them. 🎯

Read this article to learn more about:
✔️ ICS
✔️ SCADA
✔️ The differences between OT, ICS, and SCADA
✔️ How a SCADA system works
✔️ The types of data SCADA systems collect
✔️ How cybercriminals attack ICS and SCADA systems
✔️ Best practices for securing ICS and SCADA systems
✔️ Enabling Security Monitoring for ICS and SCADA

graylog.org/post/understanding #cyberthreats

Threat actors are increasingly using cloud services to identify the data they intend to exfiltrate or ransom. Cloud native development, containers, and microservices allow dev teams to quickly deploy new builds. But, they also lead to a higher potential for misconfiguration. And where there are misconfigurations there are vulnerabilities that leave openings for threat actors. ☠️ 😦

So, what can #security teams do about this? 🤔 They can shine a spotlight on what’s in their #API traffic! 🔦 Once you know how #cybercriminals are accessing sensitive data, you can stop them from gaining access to it. 🛑

Critical security steps need to happen before data exfiltration does. Learn more about predicting risk and closing your vulnerability gap, in this article by #Graylog's Seth Goldhammer.

securityboulevard.com/2025/03/ #cybersecurity #APIsecurity #infosec

DATE: March 17, 2025 at 08:57AM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

What makes #healthplans attractive targets for #cybercriminals? t.co/jgYPLXmaOU

Here are any URLs found in the article text:

t.co/jgYPLXmaOU

Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

When users visit a website that requests permission to send notifications, they may unknowingly grant scammers a powerful tool. #Cybercriminals take advantage of this by tricking users into accepting notifications. Once accepted, users are bombarded with misleading messages that redirect them to fraudulent content. #cybersecurity
ciso2ciso.com/what-happens-whe

what-happens-when-push-notifications-go-malicious?-–-source:hackread.com
CISO2CISO.COM & CYBER SECURITY GROUP · What Happens When Push Notifications Go Malicious? – Source:hackread.comSource: hackread.com - Author: Waqas. Push notifications are a common feature that many websites use to keep users engaged. However, what happens when

When we started recording podcasts, Sean Martin and I put writing on pause for a bit—but now it’s back, not just in our individual newsletters but also in our event coverage. I enjoy writing, and I plan to do even more with my Musings on Society & #Technology newsletter here on LinkedIn.

That said…

Here’s my final article (#4) from the ITSPmagazine Podcasts coverage of ThreatLocker’s Zero Trust World 2025 (#ZTW25). In this piece, I reflect on the intersection of society, cybersecurity, innovation, and disruption, inspired by the final keynote from Reggie Fils-Aime, former President and COO of #Nintendo.

"The Disruptive Edge: Innovation, #Cybersecurity, and the Future of a #ZeroTrust Society."

Throughout our coverage, we tackled the evolution of cyber threats, the dark web, supply chain security, #cybercriminals tactics, and now, in this final piece, we turn our focus to the bigger picture.

From Reggie Fils-Aime’s insights on disciplined, disruptive innovation to Danny Jenkins’ closing words on embedding security into everything we build, the event left us with one key question: Is innovation moving too fast for security to keep up, or are we finally embedding security at the core of progress?

For centuries, innovation was slow. Then came the Industrial Revolution, and today, we live in an era of hyper-acceleration, where disruption isn’t a choice—it’s a given. #AI, #automation, and cybersecurity threats evolve faster than we can regulate or adapt. But is this pace making us stronger, or is security still an afterthought?

🔹 Are we innovating responsibly?
🔹 Are we embedding security into progress?
🔹 Are we disrupting for the right reasons?

Huge thanks to #ThreatLocker for bringing us together in Orlando for these critical discussions and to the incredible speakers who shaped our coverage.

As Danny Jenkins put it best:
"Security isn’t a feature you add later—it’s the foundation of everything we build."

Check out the full article and join the conversation: itspmagazine.com/event-coverag

Here is all (A LOT) our content from the event:
itspmagazine.com/zero-trust-wo

Enjoy, comment, and share!

David Coovert

ITSPmagazine Podcast NetworkThe Disruptive Edge: Innovation, Cybersecurity, and the Future of a Zero Trust Society
| Zero Trust World 2025 | On Location with Sean and Marco — ITSPmagazine Podcast Network | Broadcasting Ideas. Connecting Minds.™The grand finale of ThreatLocker ’s Zero Trust World 2025 was not just a closing act—it was a challenge. A call to rethink how we innovate, disrupt, and secure our rapidly evolving digital landscape. From Reggie Fils-Aime’s compelling insights on disciplined, disruptive innovation to Danny

@dianasusanti : w.r.t. Indonesian speaking people, the image below that I just made shows another fake site - which will look familiar to Android users.

Note that it has a website certificate submitted by "Google Trust Services" while the site hides behind a Cloudflare IP-address.

It is not surprising that people fall for this, as (for example), to log in to Microsoft you have to go to:

https:⧸⧸login.microsoftonline.com

Instead of, any of, for example:

https:⧸⧸login.microsoft.com
https:⧸⧸login.365.microsoft.com
https:⧸⧸login.office.microsoft.com

Another scamwebsite:

https:⧸⧸lîdl·be/login

Note the î instead of the i.

P.S. I'm using
· instead of . and
⧸ instead of /
to prevent accidental opening.