YouTube video by SocialProof Security
The Latest Messaging Scams - WhatsApp PSA
See lots of scam messages via text & apps lately? Youโre not alone!
Scammers are using people's economic anxiety to trick with lures that are too good or too dire to be true! They're also using AI to create attacks.
Here are the latest messaging scams + how to catch them.
youtube.com/shorts/K8x86...
05.08.2025 16:22 โ ๐ 4 ๐ 1 ๐ฌ 0 ๐ 0
Stream live news 24/7, including NBC News NOW, Sky News, Dateline, Noticias, TODAY All Day, and more. Choose your local market and stream for free today.
Stream live news 24/7, including NBC News NOW, Sky News, Dateline, Noticias, TODAY All Day, and more. Choose your local market and stream for free today.
Iโll be on NBC News Now soon talking thru the Tea App hack and how to protect yourself during a data breach sometime between 7-8 pm ET tonight (probably 7:30 pm ET) if you want to watch ๐ค๐ค
nbcnews.com/watch or www.youtube.com/watch?v=3o_t...
29.07.2025 22:50 โ ๐ 20 ๐ 7 ๐ฌ 0 ๐ 0
Exactly right
28.07.2025 23:21 โ ๐ 5 ๐ 0 ๐ฌ 0 ๐ 0
It doesn't matter whether this app was a honeypot or just vibe coded by a bunch of assholes with no security awareness, the impact is exactly the same
28.07.2025 23:20 โ ๐ 25 ๐ 4 ๐ฌ 2 ๐ 0
A 2nd Tea App breach?! | Rachel Tobac
A 2nd Tea App breach?! Now 1 million leaked messages w/ sensitive cheating stories, details of ending pregnancies, contact details, real names โ it could not be more serious. Here are actions to prote...
2nd Tea App breach?! 1 million messages w/ sensitive cheating stories, details of ending pregnancies, contact details, real names โ it could not be more serious. Here are actions to protect yourself.
Iโll be on NBC News Now at 7 pm ET tomorrow discussing this.
www.linkedin.com/posts/rachel...
28.07.2025 23:12 โ ๐ 17 ๐ 9 ๐ฌ 1 ๐ 2
6. Why the Tea App hack matters -- why selfies and IDs together allow a hacker to perform account takeover with deepfakes and how to catch it
28.07.2025 18:20 โ ๐ 5 ๐ 0 ๐ฌ 0 ๐ 0
4. AI voice clones and how they are hitting everyday families in the wild in 2025 to steal money & how to catch it
5. How live AI agents automate and scale hacking with voice clones over the phone and how to catch them
28.07.2025 18:20 โ ๐ 4 ๐ 0 ๐ฌ 1 ๐ 0
2. How AI voice clones hack voice biometrics for bank account take over & how to stop it
3. Live AI deepfakes hacking KYC, liveness detection, and identity verification for account takeover for banks, social media accounts, etc & how to stop it
28.07.2025 18:19 โ ๐ 8 ๐ 1 ๐ฌ 1 ๐ 0
Time to find the right journalist(s) for live hacking demo video pieces. If you're coming to DEF CON and want a scoop, lmk:
1. How AI voice clones are currently being used to target Execs and their orgs in the wild for wire transfer fraud, passwords, and document stealing & how to stop it
28.07.2025 18:19 โ ๐ 16 ๐ 7 ๐ฌ 1 ๐ 0
Simple as that ๐ฅฒ
24.07.2025 18:41 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
took this into work today and showed folk there... I think we might see some change ... thank you for doing this
09.07.2025 09:14 โ ๐ 3 ๐ 1 ๐ฌ 1 ๐ 0
Thatโs awesome!!
09.07.2025 11:42 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Thank you!
08.07.2025 23:09 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
I was so sad the day I realized AI could finally tackle the Irish accent. @donie.bsky.social was safe for so long
08.07.2025 23:09 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
I guess I may need to!
08.07.2025 19:31 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
AI voice clones have hit the White House AGAIN, now impersonating the Secretary of State to other Gov officials to try to steal secrets/access.
Here is a video of me live demoing how quick (2 min) and easy it is to clone a voice to hack and how to catch AI voice clone attacks in action!
08.07.2025 19:19 โ ๐ 42 ๐ 16 ๐ฌ 4 ๐ 0
This. I know people who are naturally graceful and kind at cons like Wendy Nather or my lovely spouse @deviantollam.bsky.social or @racheltobac.bsky.social or so many other icons I look up to.
But as an introvert it is *hard* to have that energy. Itโs physically draining, though very meaningful.
01.07.2025 18:11 โ ๐ 26 ๐ 1 ๐ฌ 4 ๐ 0
Aw thank you for this kind sentiment. Itโs deeply meaningful to me and after I sit in a very dark room quietly for hours to feel regulated again ha!
01.07.2025 19:55 โ ๐ 6 ๐ 0 ๐ฌ 1 ๐ 0
Thanks Andy!
30.06.2025 18:31 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Hacker Conversations: Rachel Tobac and the Art of Social Engineering
Interview with Rachel Tobac, hacker and social engineer who is co-founder and CEO of SocialProof Security.
It's fun to learn from smart people. @racheltobac.bsky.social is smart people. Check out: Hacker Conversations: Rachel Tobac and the Art of Social Engineering. www.securityweek.com/hacker-conve... cc @gate15.bsky.social #cybersecurity
30.06.2025 13:34 โ ๐ 3 ๐ 2 ๐ฌ 1 ๐ 0
Rachel Tobac hacking in the glass booth in front of 500 people at DEF CON 25.
I got my start hacking in the booth at @defcon.bsky.social. It changed my life. Now I'm a *Judge* for the NEW Social Engineering Community Village AI-powered hacking competition where teams use AI agents for live phone call attacks on DEF CON Sat! Apply to compete: www.se.community/battle-of-th...
24.06.2025 23:37 โ ๐ 46 ๐ 6 ๐ฌ 0 ๐ 0
YouTube video by Atlassian Community
Rachel Tobac - Security, hackers and password
Il y a quelques annรฉes, @racheltobac.bsky.social avait adaptรฉ ce magnifique shanty ๐ www.youtube.com/watch?v=Ft5b...
21.06.2025 00:02 โ ๐ 5 ๐ 1 ๐ฌ 0 ๐ 0
So great to join you and showcase all of my wigs, grey hair spray and glasses for live video deepfakes lol!
11.06.2025 19:34 โ ๐ 4 ๐ 0 ๐ฌ 1 ๐ 0
Another stellar Wednesday Offensive! Thank you @racheltobac.bsky.social for an engaging conversation and real time examples of the power of Deepfakes!
Next week we have Kevin Ripa discussing "When forensics gets it wrong"
#hacking #infosec #cybersecurity
11.06.2025 19:23 โ ๐ 7 ๐ 1 ๐ฌ 2 ๐ 0
It's time to reorient ourselves with the Disgruntled Former Teammate & Insider Threat Prevention Handbook.
insights.sei.cmu.edu/library/the-...
06.06.2025 02:55 โ ๐ 77 ๐ 12 ๐ฌ 1 ๐ 0
Voice clones are easy.
Be suspicious even if a call appears to be from someone you know.
AlsoโฆDonโt set up voice authentication for banking.
30.05.2025 15:52 โ ๐ 34 ๐ 13 ๐ฌ 0 ๐ 0
Please train your team to spot and shut down voice clone attacks. This attack is easy for beginner attackers and weโre seeing this attack vector increase week over week (now many of my customers have had their execs voice cloned to staff in the past quarter).
x.com/racheltobac/...
30.05.2025 14:23 โ ๐ 7 ๐ 3 ๐ฌ 0 ๐ 1
Additionally, I donโt need to take control of someoneโs phone number to succeed with this type of attack. Often times Iโm just voice cloning and spoofing a phone number to appear on caller ID (but it doesnโt even seem the attacker did that in this case)!
30.05.2025 14:22 โ ๐ 10 ๐ 2 ๐ฌ 1 ๐ 0
I am now able to now able to create a believable voice clone using just 10 seconds of someoneโs recorded voice. The tools are publicly available, easy to use, and in many cases they are free.
Itโs essential your family, friends, and workplace understands how easy this attack is.
30.05.2025 14:22 โ ๐ 11 ๐ 4 ๐ฌ 2 ๐ 0
Veteran film/TV/media maker; NYT bestselling author; storyteller; dog mom. Direct descendant John Alden & Priscilla Mullins 1620. My American ancestors were defending democracy since 1776. ๐บ๐ธ ๐ฎ๐ช & #Ally ๐บ๐ฆ ๐จ๐ฆ ๐ณ๏ธโ๐ ๐ณ๏ธโโง๏ธ
Public interest technologist. hockey โข music โข food โข bikes
formerly FiveThirtyEight โข Apple โข USDR โข Tech Matters โข etc.
I love product, infra/security software, and basketball. Living and working in the SF Bay Area.
๐จโ๐ป Cyber researcher at JHU Applied Physics Lab
๐ Doctoral candidate at JHU Whiting School of Engineering (space cyber)
๐ญ Amateur astronomer
๐น๏ธ Video game connoisseur
๐ Math/science/history nerd, married to a geologist
โ๏ธ USAF vet
Father of dogs
Knower of randomness
Follow EPIC on BlueSky at our verified account, @epic.org!
Dartmouth, NS dad; software engineer; fan of giant robots in many contexts, board games, RPGs. Queer rights are not negotiable. (He/Him)
Healthcare, IoT, ICS, Product, Enterprise. Salt water boating, cancer research, Sourdough OG. Social Liberal.
Senior Security Engineer in Detection Engineering, aficionado of terrible science fiction novels, puppet of the algorithm. ๐จ๐ฆ living and working in Silicon Valley.
Blue Jays, Canucks, Jaguars.
Avatar generated by Midjourney.
DEF CON is the world's most influential hacker conference. Held every year since 1993 in Las Vegas, Nevada, DEF CON is the hub of a global community of hackers [โฆ]
๐ bridged from https://defcon.social/@defcon on the fediverse by https://fed.brid.gy/
Cybersecurity / Infosec Leader, Teller of Rambling, Pointless Stories, Provider of Dubious Career Advice.
Professional alt, unprofessional posts.
Masto: @chrismerkel@infosec.exchange
DFIR, security, networking, all things tech, OneWheel, Radinn, travel, LEGO, and probably a whole lot more in small and sporadic bits. (Squirrel!)
Fierce and unapologetic ally. He/him/his.
Tinkerer Maker Solderer Mom โข lateral thinker โข LEDs improve everything โข she/her
Colin is a huge nerd. Hardware hacking, open-source hardware, electronics design, academic stuff, dog stuff in some order. Assistant Prof @ Dalhousie Uni, advisor/co-founder NewAE Technology Inc.
Senior information security architect. Hacker. Electronic music producer and synth nerd. Trauma surgeon. Surgical AI expert. Disabled (wheelchair user) and disability advocate/speaker.
#RedTeam4Life #LethalForensicator fictional character ๐ฅธ Ally of all (He/His/Him) #BLM
โฌ
๏ธ๐ณ๏ธโ๐๐๏ธโโ๏ธ๐ช๐จ๐ป๐๐ฎ๐ฆ๐ง ๐ถ๏ธโพ๏ธ
(She/They) That one purple raccoon who makes art, enjoys video games and comic books, lifts heavy weights, advocates against abuse, and sometimes talks about infosec, strategy, and leadership.
https://ko-fi.com/myraccoonhands
SANS Principal Instructor. IT Security practitioner. GSE 209. Gamer and runner in my abundant spare time. Likely being sarcastic. Florida Man as a Service. He/Him
Medium.com/@james.leyte.vidal
Cat dad. Security Nerd. Overly candid at times. Makes lots of mistakes. Likes are usually cat pics... โDonโt tell me you canโt becauseโฆtell me you can if.โ -Marty Sklar