Aiden Mitchell (@amitchell516) 's Twitter Profile
Aiden Mitchell

@amitchell516

Moved to threads.net/@amitchell516

ID: 1468466465409961985

linkhttps://aiden.lgbt calendar_today08-12-2021 06:24:32

375 Tweet

87 Followers

1,1K Following

Sublime Security (@sublime_sec) 's Twitter Profile Photo

Sublime has observed an increase in QR code credential phishing attacks over the past several weeks. We've enabled a new scanner to decode QR codes embedded in message bodies or attachments, and pushed new coverage to prevent these attacks: github.com/sublime-securi…

Sublime has observed an increase in QR code credential phishing attacks over the past several weeks.

We've enabled a new scanner to decode QR codes embedded in message bodies or attachments, and pushed new coverage to prevent these attacks: github.com/sublime-securi…
Josh Kamdjou (@jkamdjou) 's Twitter Profile Photo

This is so sick. Email -> Attached EML -> Embedded image -> OCR -> NLU to identify a financial request. Outlook/many clients will render an attached EML in the *original* message, making this an effective evasion technique. We've seen this in the wild recently. h/t Aiden Mitchell

This is so sick. Email -&gt; Attached EML -&gt; Embedded image -&gt; OCR -&gt; NLU to identify a financial request. Outlook/many clients will render an attached EML in the *original* message, making this an effective evasion technique. We've seen this in the wild recently. h/t <a href="/amitchell516/">Aiden Mitchell</a>
Aiden Mitchell (@amitchell516) 's Twitter Profile Photo

Can confirm, it just works. Now it looks like I have a FortiGate at home :p maybe tomorrow it'll look like I have a Sophos firewall

Josh Kamdjou (@jkamdjou) 's Twitter Profile Photo

If you're running Sublime Security, you can prevent this at your email perimeter. delivr.to put out a detection for the WinRAR vuln when the CVE initially dropped: share.sublime.security/feeds/delivr-t…

If you're running <a href="/sublime_sec/">Sublime Security</a>, you can prevent this at your email perimeter. <a href="/delivr_to/">delivr.to</a> put out a detection for the WinRAR vuln when the CVE initially dropped: share.sublime.security/feeds/delivr-t…
Aiden Mitchell (@amitchell516) 's Twitter Profile Photo

why make employees suffer with these useless assessments, when you could invest in better email security punishing employees for failing phishing tests is not the answer...

Josh Kamdjou (@jkamdjou) 's Twitter Profile Photo

EML attachments are a clever way to bypass traditional analysis because they automatically get rendered and embedded in the original message, without user interaction, by most mail clients: sublime.security/blog/hidden-cr… h/t Aiden Mitchell

Sublime Security (@sublime_sec) 's Twitter Profile Photo

Scammers are using distribution lists to hide their tracks while blasting a wide range of targets in this new variant of Living Off the Land (LOTL) + callback phishing attacks. We’ve seen it with trusted brands like Microsoft, Venmo, and PayPal. Learn how the scam works:

Scammers are using distribution lists to hide their tracks while blasting a wide range of targets in this new variant of Living Off the Land (LOTL) + callback phishing attacks. 

We’ve seen it with trusted brands like Microsoft, Venmo, and PayPal. Learn how the scam works:
sam scholten (@samkscholten) 's Twitter Profile Photo

🚨 Detection coverage for CVE-2025-21298: 🤝 h/t to our friends at delivr.to for their excellent detection work: github.com/delivr-to/dete… 💪 🔍 Sublime Security 's existing rule flags this too: sublime.security/feeds/core/det…