lol thatโs cool, glad I work with your org!
27.02.2026 15:19 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0@racheltobac.bsky.social
Hacker & CEO @SocialProofSec security awareness/social engineering training, videos, talks | 3X @DEFCON๐ฅ | Ex Chair @WISPorg | Ex @CISAgov Technical Advisory Council under Director Jen Easterly
lol thatโs cool, glad I work with your org!
27.02.2026 15:19 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0I watch my companyโs security awareness training just because the speaker is @racheltobac.bsky.social
27.02.2026 12:30 โ ๐ 12 ๐ 1 ๐ฌ 3 ๐ 0Message from "Signal Support" Dear User, this is Signal Security Support ChatBot. Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via SMS to your registered phone number. If this was NOT you: To secure your account and block this unauthorized access, please reply to this message with the verification code you just received. If this WAS you: You can safely ignore this message. The login attempt will be automatically approved shortly. Thank you for helping us keep your account secure.
Signal will never message you like this.
If you get a message like this, SOMEONE IS TRYING TO HACK YOUR SIGNAL.
DO NOT GIVE THEM THAT CODE.
In the last days, there has been an unprecedented attack targeting investigative journalists trying to seize their Signal accounts. This has gone largely unreported. I have been repeatedly targeted by phishing, and I learned that also colleagues from other outlets were targeted, with the attackers unfortunately managing to compromise at least one colleagueโs account. Whatโs worrying: this doesnโt seem like an isolated case. A broader wave is apparently hitting journalists (and some civil society actors) via Signal. How it works: Attackers message you on Signal pretending to be โSignal Support,โ warning about โsuspicious activity,โ and urging you to โre-verifyโ your account. Once you accept the chat, you receive a real Signal SMS verification code, because the attacker is actively trying to register your number on a new device. If you share that code, youโre handing them the keys. Signalโs extra protection is the Signal PIN. If an attacker also tricks you into giving up your PIN (or you donโt have strong protections enabled), they can see your contacts and networks, potentially join chats going forward, and lock you out by changing settings. Quick protections worth doing today: - Signal will never contact you via a two-way in-app support chat. Treat those messages as hostile. - Never share SMS codes, Signal PIN, or anything called โregistration lock.โ - Turn on Registration Lock (Settings โ Account โ Registration Lock). - If you see a โsafety number changedโ alert: verify the person via a different channel (call/video), not just Signal text. - Report + block suspicious requests, and review linked devices. If you work with sensitive sources: this isnโt just about losing an account, itโs about exposing networks. Please share this with colleagues who rely on Signal day-to-day.
WARNING, fellow journalists: As @nicoschmidt.io explains, attackers are trying to hijack reporters' Signal accounts by tricking people into handing over their 2FA codes. www.linkedin.com/posts/nicosc...
28.01.2026 19:49 โ ๐ 884 ๐ 672 ๐ฌ 11 ๐ 38lol I very truly donโt, itโs quite frizzy and the good lighting masks it! Lighting is everything.
27.01.2026 16:35 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0If youโre an activist, journalist, exec, or have a high threat model for any other reason, I do recommend using all tools to protect against spyware including Appleโs lockdown mode and WhatsAppโs new Strict Account Settings. Thanks WhatsApp for the partnership to get the word out to folks.
27.01.2026 15:46 โ ๐ 25 ๐ 8 ๐ฌ 4 ๐ 0V good
14.01.2026 23:31 โ ๐ 3 ๐ 0 ๐ฌ 1 ๐ 0The repairable, customizable, build-it-yourself, physical webcam & mic kill switch, Linux compatible, port swappable @frame.work laptop has hit the SocialProof office ๐ค๐ค
14.01.2026 16:47 โ ๐ 70 ๐ 4 ๐ฌ 5 ๐ 2Great work from @racheltobac.bsky.social, with @cnn.com: How the latest deepfake scam can cheat companies out of millions. Good one to share with your company, and with friends & loved ones. edition.cnn.com/2025/10/07/b... cc @craignewmark.bsky.social @pausetake9.bsky.social @gate15.bsky.social
10.10.2025 11:42 โ ๐ 12 ๐ 10 ๐ฌ 2 ๐ 0An totally entertaining, and informative interview with @racheltobac.bsky.social and Scammer Payback about hacking and handling your online privacy in the new epoch of AI. youtu.be/xEdZwLRJttQ?...
13.10.2025 09:57 โ ๐ 36 ๐ 11 ๐ฌ 2 ๐ 1
Episode 22: Social Engineering, Gas Mark 4, and AGAs with Rachel Tobac!
@tib3rius.bsky.social & @swiftsecur.bsky.social are joined by @racheltobac.bsky.social to talk social engineering war stories...and more!
Links below!
โThe consumerโs son has been interacting with an AI chatbot called ChatGPT, which is advising him not to take his prescribed medication and telling him that his parents are dangerous,โ reads the FTCโs summary of one of the calls.
22.10.2025 13:37 โ ๐ 36 ๐ 16 ๐ฌ 2 ๐ 5Hey @racheltobac.bsky.social you're probably going to need to hire a lot more people for all the new clients you're about to get.
16.10.2025 15:53 โ ๐ 9 ๐ 1 ๐ฌ 1 ๐ 0Oh goodness gracious
16.10.2025 22:32 โ ๐ 5 ๐ 0 ๐ฌ 0 ๐ 0Thanks for watching!
13.10.2025 23:10 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0Thank you Andy!
10.10.2025 12:16 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
In 2025, I've had a steep increase in reports from clients about AI voice clone phone calls asking for money, passwords or codes.
I give it about 12 months before criminals increase use of live video call deepfakes in their scams.
Get your folks & team prepared to catch it now.
continued...
- Fraudsters Cloned Company Director's Voice In $35 M Heist: forbes.com/sites/thomas...
- Wiz CEO says company was targeted with deepfake attack that used his voice: techcrunch.com/2024/10/28/w...
These live video call or audio call deepfakes are increasing in the business world. Most often, an exec is deepfaked to the team that supports them asking for money, passwords, MFA codes, etc:
- $25M sent to scammers in Arup video call deepfake attack cnn.com/2024/05/16/t...
*My Latest CNN Zoom Call Deepfake Demo*
An eng org sent $25M to scammers who deepfaked the CFO in a live video call.
Are your colleagues, fam & friends ready to catch this AI attack?
I demo'd a live Zoom deepfake to CNN's Clare Duffy to help you spot the signs:
edition.cnn.com/2025/10/07/b...
Two of our tech reporters tested out Sora, a smartphone app made by OpenAI that lets people create videos entirely from A.I. โIt is, in effect, a social network in disguise; a clone of TikTok down to its user interface, algorithmic video suggestions and ability to follow and interact with friends.โ
02.10.2025 21:12 โ ๐ 48 ๐ 12 ๐ฌ 22 ๐ 3Thanks for reading!
02.10.2025 23:45 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
"It makes it really easy to create a believable deepfake in a way that we havenโt quite seen yet."
-- @racheltobac.bsky.social, CEO of SocialProof Security, a cybersecurity start-up in San Francisco
My worddd
29.09.2025 23:05 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0@racheltobac.bsky.social new threat model for businesses? ๐ฌ๐ตโ๐ซ
29.09.2025 15:19 โ ๐ 11 ๐ 2 ๐ฌ 3 ๐ 0Thank you for the kind words!!
17.09.2025 15:17 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0This should be mandatory watch by everybody who has a phone and or email. @racheltobac.bsky.social shows how vulnerable we all are to getting hacked through social engineering and with gAI tools it's only gotten easier.
17.09.2025 12:47 โ ๐ 48 ๐ 10 ๐ฌ 2 ๐ 3Thank you!!
10.09.2025 13:59 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0I only watched this today, but I enjoyed it immensely. So many security lessons in a very entertaining package. ๐
10.09.2025 12:09 โ ๐ 13 ๐ 2 ๐ฌ 1 ๐ 0