Special K
banner
specialk3.bsky.social
Special K
@specialk3.bsky.social
Born Texan, cyber security/InfoSec solutioner love sports, and enjoy meeting new people...I've been told. Tweets are my own, beware...
Reposted by Special K
📌 Phishing Attacks Expand Beyond Email: LinkedIn Emerges as Prime Target for Executive Spear-Phishing https://www.cyberhub.blog/article/15726-phishing-attacks-expand-beyond-email-linkedin-emerges-as-prime-target-for-executive-spear-phishing
Phishing Attacks Expand Beyond Email: LinkedIn Emerges as Prime Target for Executive Spear-Phishing
The cybersecurity landscape is evolving as phishing attacks increasingly move beyond traditional email vectors. According to recent research, one-third of phishing attacks now occur through non-email channels such as social media platforms, search engines, and messaging applications. This shift represents a significant challenge for security teams that have traditionally focused their anti-phishing efforts on email protection. LinkedIn has emerged as a particularly effective platform for attackers, with sophisticated spear-phishing campaigns targeting corporate executives. The platform's professional nature creates an environment of inherent trust, which attackers exploit by creating convincing fake profiles and leveraging LinkedIn's messaging system for initial contact. The richness of professional information available on LinkedIn enables highly targeted attacks that are more likely to succeed. Technically, this shift is driven by several factors. First, email security has improved significantly with widespread adoption of protocols like SPF, DKIM, and DMARC, making email-based phishing more difficult. Second, social media platforms often lack the same level of security scrutiny as corporate email systems. Third, the interconnected nature of professional networks on LinkedIn provides attackers with valuable reconnaissance data to craft convincing spear-phishing messages. For cybersecurity professionals, this trend necessitates a broader approach to phishing defense. Security awareness training must expand beyond email to cover social media platforms and other communication channels. Organizations should implement monitoring of corporate social media accounts for suspicious activity and educate executives about the risks of professional networking platforms. The rise of multi-channel phishing also highlights the need for more comprehensive threat intelligence that monitors various communication platforms. Security teams should consider implementing solutions that can detect phishing attempts across multiple channels and provide unified reporting. Additionally, organizations may need to revisit their acceptable use policies for professional networking sites to include specific security guidelines. This evolution in phishing tactics underscores the importance of a defense-in-depth strategy that addresses multiple attack vectors. As attackers continue to innovate and exploit new channels, cybersecurity professionals must adapt their strategies to protect against these emerging threats while maintaining business functionality on platforms like LinkedIn.
www.cyberhub.blog
November 18, 2025 at 10:40 AM
Reposted by Special K
The Fake Job Interview: How Hackers Use Social Engineering to Deliver Malicious Payloads

Introduction: A new social engineering campaign is targeting IT professionals through fake job interviews, demonstrating an alarming evolution in attack vectors. Hackers are posing as recruiters to build trust…
The Fake Job Interview: How Hackers Use Social Engineering to Deliver Malicious Payloads
Introduction: A new social engineering campaign is targeting IT professionals through fake job interviews, demonstrating an alarming evolution in attack vectors. Hackers are posing as recruiters to build trust before delivering malicious code under the guise of technical assessments, bypassing traditional security awareness. This sophisticated approach exploits the job-seeking process to compromise systems through what appears to be legitimate interview tasks.
undercodetesting.com
November 18, 2025 at 10:42 AM
Reposted by Special K
America's most notorious child rapist, Jeffrey Epstein, said this man was the worst person he'd ever met. Let that sink in.
November 14, 2025 at 12:36 AM
Reposted by Special K
This has been confirmed today: operation-endgame.com

Europol took down servers for the Rhadamanthys infostealer, the VenomRAT, and the Elysium botnet
There are reports that Europol seized the Rhadamantys Stealer infrastructure

x.com/club31337/st...
November 13, 2025 at 12:23 PM
Reposted by Special K
New Danabot Windows version appears in the threat landscape after May disruption
New Danabot Windows version appears in the threat landscape after May disruption
DanaBot returns after 6 months with a new Windows variant (v669), marking its comeback after being disrupted by Operation Endgame in May.
securityaffairs.com
November 12, 2025 at 7:42 PM
Reposted by Special K
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
Russian broker pleads guilty to assisting US cyberattacks
: Aleksei Volkov faces years in prison, may have been working with other crews
www.theregister.com
November 10, 2025 at 3:36 PM
Reposted by Special K
October 30, 2025 at 4:53 PM
Reposted by Special K
A new ICE proposal outlines a 24/7 transport operation run by armed contractors—turning Texas into the logistical backbone of an industrialized deportation machine. www.wired.com/story/ice-is...
ICE Wants to Build a Shadow Deportation Network in Texas
A new ICE proposal outlines a 24/7 transport operation run by armed contractors—turning Texas into the logistical backbone of an industrialized deportation machine.
www.wired.com
October 30, 2025 at 4:53 PM
Reposted by Special K
WOW! The Washington Post obtained the rest of the body cam footage showing that the drunk-driving ICE agent promised to check if the arresting officer's partner was Haitian. "I’m going to run some checks when I get back." He added that he would have him deported if "not legit."
October 29, 2025 at 8:55 PM
Reposted by Special K
Trump doesn't see the world like I do. He divides the world into strong /weak leaders and and those who praise him/don't. That is bad for America's national interests. Discussing the ideas in my new book Autocrats vs. Democrats on @lastword.msnbc.com
October 28, 2025 at 6:09 PM
❤️❤️❤️🏆🏆🥇🥇🏆🏆🥇🥇💪💪💪💪
🐐 🏆🏆🏆🏆🏆🏆

“You know, I never wanted to miss a game because it was an opportunity to prove. It was something that I felt like the fans are there that watch me play. I want to impress that guy way up on top who probably worked his [butt] off to get a ticket or to get money to buy the ticket."
Jordan: Load management never should happen
Michael Jordan didn't hold back on load management in the NBA, saying on NBC: "It shouldn't be needed, first and foremost."
www.espn.com
October 29, 2025 at 1:37 PM
Reposted by Special K
🐐 🏆🏆🏆🏆🏆🏆

“You know, I never wanted to miss a game because it was an opportunity to prove. It was something that I felt like the fans are there that watch me play. I want to impress that guy way up on top who probably worked his [butt] off to get a ticket or to get money to buy the ticket."
Jordan: Load management never should happen
Michael Jordan didn't hold back on load management in the NBA, saying on NBC: "It shouldn't be needed, first and foremost."
www.espn.com
October 29, 2025 at 1:20 PM
Reposted by Special K
New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms
New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms
cybersecuritynews.com
October 29, 2025 at 1:33 PM
Reposted by Special K
Hurricane Melissa path tracker: Jamaican authorities have ordered mandatory evacuations as what is predicted to be the worst hurricane to ever hit the island closes in on land ⬇️
Hurricane Melissa tracker: mapping Jamaica’s category 5 storm
Hurricane Melissa path tracker: updates and latest news today
www.thetimes.com
October 28, 2025 at 8:32 AM
Reposted by Special K
If they don't care about feeding hungry kids that are already here, stop calling them pro-life.

Cutting SNAP benefits is atrocious.
October 28, 2025 at 7:42 AM
Reposted by Special K
Tim Walz: "People are gonna be lined up out here to get food, and we're talking about a damn ballroom. Don't lose the plot."
October 27, 2025 at 3:34 PM
Reposted by Special K
Trump is the only president to leave the country during a government shutdown
October 27, 2025 at 5:54 PM
Reposted by Special K
The entire Republican Party is in thrall to a 79-year-old whose behavior, if you saw it in a teenager, would cause you to believe they were emotionally unwell and would prompt intervention.
Precisely because it's not the biggest issue here we are sleeping on how profoundly weird the idea of dumping shit out of a fighter jet onto your political opponents is.
October 19, 2025 at 10:15 PM
Reposted by Special K
📌 Clop Ransomware Group Claims Hack of Harvard University, Adds Institution to Data Leak Site https://www.cyberhub.blog/article/14337-clop-ransomware-group-claims-hack-of-harvard-university-adds-institution-to-data-leak-site
Clop Ransomware Group Claims Hack of Harvard University, Adds Institution to Data Leak Site
The Clop ransomware group has claimed responsibility for hacking Harvard University, adding the prestigious institution to its data leak site on the Tor network. According to a report by Security Affairs, Clop has created a dedicated page for Harvard on its site and announced its intention to disclose the stolen data. However, no additional details about the nature of the compromised data or the specific impacts of the breach have been provided. Clop is known for its double-extortion tactics, where it encrypts victims' data and threatens to leak it if ransom demands are not met. The use of the Tor network for hosting the leak site underscores the group's commitment to maintaining anonymity and evading law enforcement. This incident highlights the increasing audacity of ransomware groups in targeting high-profile organizations. Universities, with their vast repositories of sensitive data, are particularly attractive targets. The potential impact of this breach could be severe, depending on the nature of the compromised data, which could range from sensitive research to personal information of students and staff. For cybersecurity professionals, this incident serves as a stark reminder of the evolving threat landscape. It underscores the need for robust cybersecurity measures, including regular security audits, employee training, and comprehensive incident response plans. Organizations should also monitor dark web and Tor sites for any signs of their data being leaked or sold. In response to such threats, institutions should consider implementing advanced endpoint protection, network segmentation, and regular data backups to mitigate the impact of ransomware attacks. Additionally, proactive threat hunting and intelligence sharing within the cybersecurity community can help in early detection and response to such incidents.
www.cyberhub.blog
October 13, 2025 at 7:20 PM
Reposted by Special K
Alarming Surge in Ransomware Attacks: Akira and Crypto24 Strike Again

Introduction: The Rising Threat of Ransomware Ransomware attacks continue to escalate globally, leaving businesses and institutions vulnerable to cybercriminals who exploit security gaps for financial gain. Recent intelligence…
Alarming Surge in Ransomware Attacks: Akira and Crypto24 Strike Again
Introduction: The Rising Threat of Ransomware Ransomware attacks continue to escalate globally, leaving businesses and institutions vulnerable to cybercriminals who exploit security gaps for financial gain. Recent intelligence from ThreatMon reveals that notorious ransomware groups “Akira” and “Crypto24” have recently targeted high-profile victims, highlighting the urgent need for heightened cybersecurity measures. These attacks underscore the persistent danger lurking in the dark web and the evolving tactics of cybercriminal networks.
undercodenews.com
October 3, 2025 at 12:39 PM
Reposted by Special K
Tim Walz: "My god, we've got the White House threatening investigations and jail time because an escalator stopped? Walk up the damn stairs!"
October 2, 2025 at 3:37 PM
Reposted by Special K
Daily Reminder: Social Security is OUR money!
October 3, 2025 at 12:23 PM
Reposted by Special K
They're cutting a lot of the sexual harassment training too, so I'm not sure this has anything to do with cyber so much as it has nothing to do with lethality.
October 3, 2025 at 12:18 PM
Reposted by Special K
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies
cybersecuritynews.com
October 3, 2025 at 12:44 PM