mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,1K
utenti attivi

#simswap

8 post5 partecipanti0 post oggi
Efani<p>End-to-end encryption doesn’t mean end-to-end protection.</p><p>Yes, WhatsApp encrypts your messages. But hackers don’t need to break the encryption.<br>They just need to break you.</p><p>That’s how most attacks happen.<br>Not with code — with clever manipulation.</p><p>A fake support message.<br>A phishing link.<br>A friend’s hijacked account asking for a code.</p><p>And the real damage comes after:</p><p>- Access to your chats<br>- Identity theft via your photo, name, and contacts<br>- Password resets and account takeovers (thanks to 2FA tied to your number)<br>- SIM swap attacks that bypass your entire digital perimeter</p><p>What makes it worse?<br>Most users never touch their privacy settings.</p><p>They leave “Last Seen,” profile photo, and group invites open to everyone.<br>They don’t enable 2FA.<br>They don’t encrypt backups.<br>They don’t lock the app or check for spyware.</p><p>And then they’re shocked when everything unravels in hours.</p><p>WhatsApp gives you the tools — but they don’t turn them on for you.</p><p>Here are 8 settings you should activate today:</p><p>1. 2FA PIN<br>2. Profile visibility: Contacts only<br>3. Group invite restrictions<br>4. Security code change alerts<br>5. Biometric app lock<br>6. Disappearing messages<br>7. Encrypted backups<br>8. App updates to patch spyware exploits</p><p>Cybercriminals don’t break into accounts.<br>They walk right through the front door — because it’s usually wide open.</p><p>Your security is only as strong as the habits behind it.</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://infosec.exchange/tags/MobilePrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobilePrivacy</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a></p>
Efani<p>When encrypted government communications get hacked… what chance do the rest of us have?</p><p>TeleMessage — a Signal-based app used by U.S. officials — has just been breached.<br>The attacker didn’t just grab some harmless metadata. They accessed contact lists, backend credentials, and entire conversations across modified versions of Signal, WhatsApp, Telegram, and even WeChat.</p><p>This wasn’t a rogue app.<br>This was the messaging tool used inside the White House.<br>Used by National Security Advisor Mike Waltz.<br>Used to discuss military operations.</p><p>And now it’s suspended — too late.</p><p>Here’s the real problem:<br>Even apps built “for privacy” can be fatally compromised when they store data insecurely, create archiving loopholes, or leave cryptographic back doors open for enterprise compliance.</p><p>And once that data is exposed?</p><p>- It gets matched with phone numbers<br>- It reveals high-value targets<br>- It paves the way for SIM swapping and full digital impersonation</p><p>This is how it starts — with a breach of trust.<br>Then comes the breach of your phone, your accounts, your identity.</p><p>We often think of mobile security as a software problem.<br>But the real threat lies deeper — in the number that ties everything together.</p><p>The lesson here is simple:<br>If world leaders can be exposed, so can you.<br>If their privacy is fragile, what about yours?</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we believe your mobile number shouldn’t be your weakest link.</p><p><a href="https://infosec.exchange/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a></p>
Efani<p>She lost access to her bank, her crypto wallet, and her identity — all because of one overlooked setting in WhatsApp.</p><p>It started with a simple message:<br>“Hey, can you send me the code you just received? I sent it to your number by mistake.”</p><p>It looked like it came from a friend.<br>She sent the code.<br>Moments later, her WhatsApp was hijacked.</p><p>But that was just the beginning.</p><p>- The attackers used her chats to impersonate her<br>- Requested money from her contacts<br>- Took over linked accounts with 2FA tied to WhatsApp<br>- Even escalated the attack with a SIM swap</p><p>All of this — preventable.</p><p>Most people assume WhatsApp is “secure enough” because of end-to-end encryption.<br>But the truth is: your own settings can be your biggest vulnerability.</p><p>If you haven’t turned on these 8 protections, you’re not secure:</p><p>* 2FA with a custom PIN<br>* Privacy limits on who can see your photo, status, and online activity<br>* Group restrictions to prevent mass-add scams<br>* Encryption alerts for contact changes<br>* Biometric lock for the app<br>* Disappearing messages for sensitive chats<br>* Encrypted cloud backups<br>* Regular updates to patch spyware exploits</p><p>This isn’t just advice. It’s damage control — before the damage hits.</p><p>Your WhatsApp isn’t just a chat app anymore.<br>It’s your digital fingerprint.<br>Don’t wait for a hacker to remind you of that.</p><p><a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p>
Efani<p>They weren’t saving for themselves.<br>They were saving for their mom.</p><p>Justin Chan and his sister shared a bank account — it was used to pay for their elderly mother’s care.</p><p>One night, while they were asleep, a stranger stole their phone number.<br>Not their phone.<br>Not their passwords.<br>Just their number.</p><p>With that, the attacker intercepted their 2FA codes, broke into their Bank of America account, and executed three wire transfers totaling $38,000.</p><p>- $20,000 went to a known felon’s account<br>- $18,000 was funneled through Robinhood and cashed out</p><p>All in under three hours.</p><p>The bank didn’t respond at first. Robinhood denied responsibility.<br>It wasn’t until media pressure mounted that the money was finally returned.</p><p>But imagine the stress, the helplessness — when the money meant to care for someone you love vanishes.</p><p>That’s the hidden cost of SIM-swapping.<br>It’s not just financial. It’s emotional. It’s destabilizing.<br>And most people don’t see it coming until it’s too late.</p><p>This entire situation could’ve been avoided with better safeguards at the carrier level — or stronger default protections from mobile providers.</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we exist because this story keeps repeating.<br>Because no one should lose their peace of mind — or their parent’s care funds — to something as preventable as a SIM-swap attack.</p><p>Secure your number like your future depends on it.<br>Because sometimes, it does.</p><p><a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/CyberSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSafety</span></a></p>
Efani<p>SMS 2FA isn’t security — it’s an illusion.</p><p>WWE star AJ Styles had two-factor authentication enabled.</p><p>It didn’t matter.</p><p>His X account was hijacked through a SIM swap — a common but devastating attack where hackers convince a mobile carrier to transfer your number to their SIM.</p><p>From there, they intercepted his 2FA codes and took control of his entire digital presence.<br>Racist tweets.<br>Crypto scam links.<br>Brand damage in real-time.</p><p>AJ later said:<br>“They stole my SIM card. Somebody at AT&amp;T allowed it to happen.”</p><p>Let that sink in.</p><p>He did everything right — or so he thought.<br>But SMS-based 2FA didn’t protect him. It opened the door.</p><p>This isn’t rare.<br>It’s not bad luck.<br>It’s a broken system.</p><p>Here’s the hard truth:</p><p>- SMS 2FA can be socially engineered<br>- It depends on your mobile carrier’s weakest employee<br>- And once your number is stolen, every linked account is at risk</p><p>If you’re still using SMS for 2FA on high-value accounts — crypto, email, social, banking — you’re playing defense with a paper shield.</p><p>Here’s what to do instead:</p><p>- Use an app-based authenticator (like Authy or Google Authenticator)<br>- Better yet, use a physical security key (like YubiKey)<br>- Assume your number will be targeted — and plan accordingly</p><p>Because in 2025, SMS 2FA isn’t protection.<br>It’s a liability in disguise.</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/Efani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Efani</span></a></p>
Pyrzout :vm:<p>El Tribunal Supremo de España aclara que el Banco es el responsable cuando te roban todo tu dinero por SIM Swapping <a href="https://blog.elhacker.net/2025/05/tribunal-supremo-de-espana-declara-culpable-banco-estafa-sim-swap.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elhacker.net/2025/05/trib</span><span class="invisible">unal-supremo-de-espana-declara-culpable-banco-estafa-sim-swap.html</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://social.skynetcloud.site/tags/dinero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dinero</span></a> <a href="https://social.skynetcloud.site/tags/estafa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>estafa</span></a> <a href="https://social.skynetcloud.site/tags/banco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>banco</span></a> <a href="https://social.skynetcloud.site/tags/robo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robo</span></a> <a href="https://social.skynetcloud.site/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a></p>
Efani<p>He lost $38,000 in one night.<br>A simple PIN could’ve stopped it.</p><p>Justin Chan was a regular user — not a celebrity, not a billionaire, not someone with enemies.<br>But that didn’t matter.</p><p>A fraudster called his mobile carrier, pretended to be him, and transferred his phone number to a new device.<br>Once they had his number, they got his 2FA codes.<br>Then came the real damage — wire transfers, account breaches, and $38,000 drained across multiple platforms.</p><p>The entire attack took just 3 hours.<br>The recovery? It took months — and media intervention.</p><p>Here’s the kicker: Justin added a PIN to his cellular account only after the incident.<br>Had that been in place earlier, the attacker wouldn’t have been able to hijack his number so easily.</p><p>That’s the reality most people don’t realize:<br>Your phone number is a master key — and it’s often protected by nothing more than a customer rep and a few easy-to-guess personal details.</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, every SIM is PIN-locked by default. Because it only takes one call to lose everything — but just one setting to stop it.</p><p>The solution isn’t complicated.<br>But ignoring it can be costly.</p><p><a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MobilePrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobilePrivacy</span></a> <a href="https://infosec.exchange/tags/Efani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Efani</span></a></p>
Efani<p>One AT&amp;T rep, one mistake - AJ Styles’ digital life was hijacked.</p><p>That’s all it took.</p><p>The WWE superstar had his X account compromised.<br>Hackers posted racial slurs.<br>They pushed crypto scam links.<br>They impersonated him in front of millions.</p><p>How?<br>A SIM swap.</p><p>Someone convinced an AT&amp;T employee to transfer AJ Styles’ phone number to a new SIM.<br>With that, they bypassed two-factor authentication, took control of his social media, and went rogue.</p><p>In a video, AJ confirmed it:<br>“They stole my SIM card. Somebody allowed that at AT&amp;T.”</p><p>Let’s be clear - this wasn’t just a hack.<br>It was a breach of trust inside a mobile carrier.</p><p>This is why cybersecurity professionals are pushing for zero-trust models.<br>Because when one employee’s error can open the gates to your entire identity - your number, your bank, your crypto, your social profiles - it’s no longer just about strong passwords. It’s about broken systems.</p><p>Here’s what you need to rethink today:</p><p>- Your phone number should not be your security key<br>- SMS-based 2FA is a vulnerability, not a safeguard<br>- Mobile carriers are not built for cybersecurity - and that’s the real danger</p><p>When your number is your identity, the weakest link is whoever answers the phone at the carrier store.</p><p>And if they can compromise AJ Styles, they can compromise anyone.</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/WWE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WWE</span></a></p>
Efani<p>If they can do this to a WWE star, what’s stopping them from doing it to you?</p><p>WWE legend AJ Styles just became the latest high-profile victim of a SIM swap attack.</p><p>His X account was hacked.<br>Racist posts appeared.<br>Crypto scams followed.<br>And fans were left in shock.</p><p>The cause?<br>Someone at AT&amp;T handed over his phone number to a hacker. That’s it.<br>One mistake - and his entire digital identity was hijacked.</p><p>Styles later shared a video, saying:<br>“They stole my SIM card. Somebody allowed that at AT&amp;T. Some idiot, some moron… was able to hack Twitter.”</p><p>This isn’t just about a celebrity getting hacked.</p><p>It’s about the terrifying reality that your phone number - the same one tied to your 2FA codes, banking, email, crypto, and social profiles - can be stolen with a single call.</p><p>SIM swap attacks aren’t rare anymore.<br>They’re exploding. And SMS-based 2FA is no longer enough to keep you safe.</p><p>Here’s what you should do now:</p><p>- Stop using SMS for two-factor authentication<br>- Use app-based authenticators or hardware keys<br>- Treat your mobile carrier as a security risk — not a safety net</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we’ve seen this play out far too often.<br>Fame doesn’t protect you. Neither does wealth.<br>Only security does.</p><p><a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a></p>
Efani<p>He didn’t lose his money to a hacker.<br>He lost it because he trusted his mobile carrier.</p><p>Justin Chan woke up to a nightmare: $38,000 gone from his bank and trading accounts.</p><p>No malware. No phishing link. No system breach.<br>Just a single phone call — made by someone pretending to be him.</p><p>They convinced his mobile provider, Xfinity Mobile, to transfer his number to a new SIM.<br>Within minutes, they intercepted his two-factor authentication codes and took over his digital life.</p><p>The attacker didn’t need passwords.<br>They didn’t need access to his devices.<br>All they needed was a vulnerable carrier and a bit of social engineering.</p><p>This is the harsh reality:<br>Your mobile number is the weak link in your entire security chain.<br>And most carriers treat it like it’s just another billing detail.</p><p>Here’s the bigger problem:</p><p>- Most users don’t even know SIM-swapping is a threat<br>- Carriers still approve number ports with basic info anyone can find online<br>- Once your number is hijacked, everything else falls like dominoes</p><p>Justin had to fight for months to get his money back. Most people don’t win that battle.</p><p>He’s now left Xfinity, added PIN protection, and moved on from his bank.<br>Because once your trust is broken — it’s hard to rebuild.</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we believe your mobile carrier should be your first line of defense, not your weakest link.</p><p>Your number holds the keys to your accounts.<br>Treat it like the asset it is.</p><p><a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Efani<p>3 hours.<br>That’s all it took for a fraudster to bypass 2FA and drain $38,000 from Justin Chan’s bank account.</p><p>The method? SIM swapping — a type of cyberattack where your phone number is hijacked and used to intercept one-time passwords.</p><p>Justin didn’t click a malicious link.<br>He didn’t fall for a phishing scam.<br>He simply trusted that his SMS-based 2FA would keep him safe.</p><p>It didn’t.</p><p>* The attacker called his mobile carrier and transferred his number.<br>* They used that number to receive 2FA codes.<br>* They accessed his bank and investment accounts.<br>* $38,000 gone before sunrise.</p><p>Most users still think “I’ve set up 2FA, so I’m safe.” But if that 2FA is tied to your phone number, it’s an open door for modern hackers.</p><p>Justin eventually got his money back — after months of stress and media pressure. But many victims don’t.</p><p>Let this be a reminder:</p><p>- Use app-based or hardware 2FA wherever possible.<br>- Audit your basic mobile privacy options.<br>- Rethink how much control your number gives others.</p><p>And if your mobile carrier doesn’t offer strong protections by default… maybe it’s time to switch.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
PUPUWEB Blog<p>SK Telecom is offering free SIM card replacements to 25M users after a major USIM data breach, but only 6M cards are available through May. Customers urged to enroll in USIM Protection for added security. <a href="https://mastodon.social/tags/SKTelecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SKTelecom</span></a> <a href="https://mastodon.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://mastodon.social/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Pyrzout :vm:<p>Hackers access sensitive SIM card data at South Korea’s largest telecoms company – Source: www.bitdefender.com <a href="https://ciso2ciso.com/hackers-access-sensitive-sim-card-data-at-south-koreas-largest-telecoms-company-source-www-bitdefender-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/hackers-access-s</span><span class="invisible">ensitive-sim-card-data-at-south-koreas-largest-telecoms-company-source-www-bitdefender-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/grahamcluleycom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grahamcluleycom</span></a> <a href="https://social.skynetcloud.site/tags/Grahamcluley" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grahamcluley</span></a> <a href="https://social.skynetcloud.site/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SouthKorea</span></a> <a href="https://social.skynetcloud.site/tags/Guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guestblog</span></a> <a href="https://social.skynetcloud.site/tags/Dataloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dataloss</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
Pyrzout :vm:<p>Dos adolescentes robaron 24 millones en criptomonedas. Su víctima los rastreó y tuvieron que devolver todo <a href="https://blog.elhacker.net/2025/04/dos-adolescentes-robaron-24-millones-criptomonedas.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elhacker.net/2025/04/dos-</span><span class="invisible">adolescentes-robaron-24-millones-criptomonedas.html</span></a> <a href="https://social.skynetcloud.site/tags/Criptomonedas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Criptomonedas</span></a> <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://social.skynetcloud.site/tags/dinero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dinero</span></a> <a href="https://social.skynetcloud.site/tags/robo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robo</span></a></p>
Pyrzout :vm:<p>Hackers access sensitive SIM card data at South Korea’s largest telecoms company <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-access-sensitive-sim-card-data-at-south-koreas-largest-telecoms-company" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/en-us/blog/hot</span><span class="invisible">forsecurity/hackers-access-sensitive-sim-card-data-at-south-koreas-largest-telecoms-company</span></a> <a href="https://social.skynetcloud.site/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SouthKorea</span></a> <a href="https://social.skynetcloud.site/tags/Guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guestblog</span></a> <a href="https://social.skynetcloud.site/tags/Dataloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dataloss</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
LavX News<p>Understanding SIM Swap Attacks: How Cybercriminals Exploit Vulnerabilities</p><p>SIM swap attacks are on the rise, and understanding their mechanics is crucial for safeguarding your digital identity. This article delves into how attackers exploit weaknesses in phone company protoc...</p><p><a href="https://news.lavx.hu/article/understanding-sim-swap-attacks-how-cybercriminals-exploit-vulnerabilities" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/understan</span><span class="invisible">ding-sim-swap-attacks-how-cybercriminals-exploit-vulnerabilities</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/TwoFactorAuthentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TwoFactorAuthentication</span></a> <a href="https://mastodon.cloud/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a></p>
Pyrzout :vm:<p>King Bob pleads guilty to Scattered Spider-linked cryptocurrency thefts from investors <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/king-bob-pleads-guilty-to-scattered-spider-linked-cryptocurrency-thefts-from-investors" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/en-us/blog/hot</span><span class="invisible">forsecurity/king-bob-pleads-guilty-to-scattered-spider-linked-cryptocurrency-thefts-from-investors</span></a> <a href="https://social.skynetcloud.site/tags/ScatteredSpider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ScatteredSpider</span></a> <a href="https://social.skynetcloud.site/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://social.skynetcloud.site/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://social.skynetcloud.site/tags/Guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guestblog</span></a> <a href="https://social.skynetcloud.site/tags/Law%E2%84%B4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lawℴ</span></a> <a href="https://social.skynetcloud.site/tags/Dataloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dataloss</span></a> <a href="https://social.skynetcloud.site/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a></p>
Bob Carver<p><a href="https://moneywise.com/banking/banking-basics/new-jersey-father-explains-how-simple-it-was-for-hackers-to-mess-wi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">moneywise.com/banking/banking-</span><span class="invisible">basics/new-jersey-father-explains-how-simple-it-was-for-hackers-to-mess-wi</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/fraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraud</span></a> <a href="https://infosec.exchange/tags/databrokers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databrokers</span></a> <a href="https://infosec.exchange/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> <a href="https://infosec.exchange/tags/ChinaSoftwareForCamera" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChinaSoftwareForCamera</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://infosec.exchange/tags/CreditFreeze" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CreditFreeze</span></a></p>
BiyteLüm<p>SIM swap attacks are one of the easiest ways hackers steal your accounts—all they need is your number.</p><p>✅ How to protect yourself:<br>✔ Port your number to a VoIP provider (MySudo, JMP.chat)<br>✔ Use app-based 2FA (NO SMS 2FA!)<br>✔ Ask your carrier for a port-out PIN</p><p>📌 Keep your number private. Keep your accounts safe.</p><p><a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SIMSwap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMSwap</span></a> <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>
Pyrzout :vm:<p>Threat Actor Claims to Have Internal T-Mobile Contacts <a href="https://dailydarkweb.net/threat-actor-claims-to-have-internal-t-mobile-contacts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dailydarkweb.net/threat-actor-</span><span class="invisible">claims-to-have-internal-t-mobile-contacts/</span></a> <a href="https://social.skynetcloud.site/tags/DarkWebNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkWebNews</span></a>&amp;Services <a href="https://social.skynetcloud.site/tags/Telecommunication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecommunication</span></a> <a href="https://social.skynetcloud.site/tags/freakycheeks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freakycheeks</span></a> <a href="https://social.skynetcloud.site/tags/T" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>T</span></a>-Mobile <a href="https://social.skynetcloud.site/tags/simswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simswap</span></a> <a href="https://social.skynetcloud.site/tags/Telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecom</span></a> <a href="https://social.skynetcloud.site/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a></p>