social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.8K
active users

#securityawareness

3 posts2 participants0 posts today

🔓 200M X (Twitter) user records leaked in a 34GB free-for-all—again.

Data enthusiast “ThinkingOne” released the files after allegedly failing to get a response from X. The breach combines:
・Data from a 2022 vulnerability X previously downplayed
・January 2025 breach data
・A total of 2.8 billion records spanning X user IDs, emails, bios, locations & more

X continues to deny its systems were the direct source of the leak. But researchers confirm much of the data is real—and the scale is unmatched.

💡 The kicker? ThinkingOne believes this might’ve required internal access, or an attack of unprecedented sophistication.

Even without passwords, this treasure trove fuels phishing, impersonation, and targeted disinformation.

👉 forbes.com/sites/daveywinder/2

Forbes200 Million X User Records Released — 2.8 Billion Twitter IDs LeakedMore than 200 million claimed leaked and stolen data records relating to X users have been posted on a popular hacker forum. What you need to know.

Alright folks, just a quick heads-up from your friendly neighborhood pentester: Office docs? Yeah, they're *still* a massive playground for attackers. 🤯

Sure, keeping things updated is vital, *but* let's be real: social engineering still wears the crown. Honestly, the least suspecting user often ends up being the biggest security gap in the network.

Just saw this play out at a client's site recently. An employee clicked open a seemingly innocent Word doc... hiding a nasty phishing link. And *poof*, their credentials were gone. 🙈 Can happen just like that.

Now, AI *can* lend a hand here, but tread carefully. The tech's evolving way faster than most people can adapt. That makes disinformation and manipulation seriously huge threats we need to watch out for.

So, what's the game plan? Awareness training – it's absolutely worth its weight in gold! Plus, fostering a healthy dose of skepticism is key, even when it feels like a drag sometimes. You gotta stay sharp.

How are *you* shielding your users from these kinds of attacks? Let me know! 🤔

🗣️ Need a keynote speaker who doesn’t beat around the bush?

I break down cybersecurity from a hacker’s perspective — the tricks they use, the gaps they exploit, and how to stay ahead. No jargon, no fluff — just real-world stories from 20+ years of experience.

🔹 CyberSecurity? AI? Social Engineering? Privacy? OSINT? I make it engaging.
🔹 No vague theories — just hard-hitting insights and actionable takeaways.
🔹 Audiences leave informed, entertained, and a little paranoid (in a good way).

🎥 Watch my speaker reel below and see why event organizers book me again.

🎤 Looking for a speaker who cuts through the noise? Let’s talk.

🙏🏽 Please share with or tag someone that may benefit from my speaking service.

#CyberSecurity #KeynoteSpeaker #Privacy #OSINT #EventSpeaker #Speaker #Training #SecurityAwareness #OSINT

Speaker Demo Reel: youtube.com/watch?v=VwNb9cgS5No

👉🏽 Let's schedule some time to talk: MishaalKhan.com/contact

What if hackers could track your team’s movements, calls, and even financial activity—without ever breaching your network?

In this clip from our latest episode of Cyberside Chats, LMG’s @sherridavidoff and @MDurrin reveal how nation-state actors are using telecom metadata to launch targeted attacks—and what IT leaders can do about it.

Watch the full video to discover key prevention tactics, including stronger authentication for financial transactions, identifying spoofed calls and texts, and securing third-party telecom providers.

📺 Watch the full episode: youtu.be/Lyiwx6upd8E
🎧 Listen to the podcast: chatcyberside.com/e/the-title-