<turbo-stream action="append" target="posts_list"><template><turbo-frame class="main-list__list-item" data-testid="Post" id="post_167179">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/167179/watch_times"
  data-youtube-player-video-id-value="Sp5kaCAexJ4"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/drywsal5qdc02onc5igyclgv36go" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/167179">
          Oct 13, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/167179">
            The LinkedIn ‘Open to Work’ Trap: How Scammers Target Job Seekers
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle:</p>
<ul>
<li>
<strong>Unity vulnerability</strong><span> </span>– A flaw in the game engine leaves millions of devices open to attack.</li>
<li>
<p><strong>AI creativity panic</strong><span> </span>– MrBeast and others warn that generative video tools could reshape content creation.</p>
</li>
<li>
<p><strong>LinkedIn scams</strong><span> </span>– Fake recruiters target people who’ve gone “Open to Work,” turning desperation into data theft.</p>
</li>
</ul>
<p>Plus: Two teenagers arrested for hacking a London nursery, an author loses six years of work after his iPad is stolen, and Discord confirms a breach exposing thousands of ID photos. Plus, DraftKings faces another password reuse incident, and a reminder from HuFiCon and Layer 8 that community and champions matter more than ever.</p>
<p><br><span> </span>Listen on your favourite podcast platform - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4NTAwMDU0NDIsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2ZGIyY2U3MjdmZmVkYzU2In0" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4NTczNDU0ODAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIwMjgyNzA5MDg1ODEyYmZhIn0" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4NjM2MzY5MzgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJkMzlhOGMyNmIwZjc2ODMxIn0" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4Njk5MjgzOTcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJkMWE2MzBjYzM2N2E3MTFhIn0" target="_blank" rel="noopener"><span><img class="m_5300348226454986957img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4NzUxNzEyNzgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJmODVlZDZiZTk2N2U3ZTgxIn0" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4ODE0NjI3MzYsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2OGY0YzE1YWE5YzJlMmRkIn0" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc4OTA4OTk5MjEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI5MjExNDM5ZjJjYzY3ZTI2In0" target="_blank" rel="noopener"><span><img class="m_5300348226454986957img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>Cyber Security Awareness Month videos with Hoxhunt</h2>






















<span><img class="m_5300348226454986957img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again this year to create a series of short, snappy videos for Cyber Security Awareness Month. Each one is just one to two minutes long and covers social engineering in messaging apps, the psychology behind social engineering, how AI is powering spear phishing, and how to spot deepfakes. They’re quick, practical, and perfect for sharing with your colleagues, friends, or family. You can grab them directly from the<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5MDAzMzcxMTAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI1YWIyZDJkMTAwNmQ3ZGIyIn0" target="_blank" rel="noopener">Hoxhunt toolkit</a>, and there are unbranded versions if you’d like to use them in your own awareness programmes.<br><br>Get the toolkit here - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5MDc2NzcxNDMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJmYTEyMDg5YmI1MjdmNDZkIn0" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>





























<h2>This week's stories...</h2>
<h2>Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk</h2>
<p>Watch the discussion - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5MTcxMTQzMjgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI1MTRkYmY5YWQ4ODY2MWZlIn0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=225</a></p>
<p>A serious flaw in the Unity game engine has left millions of games open to attack. The issue lets hackers run malicious code through the way Unity handles certain commands, putting devices at risk across Windows, macOS, Android and more.</p>
<p>Microsoft and Valve have already stepped in to block vulnerable titles while developers rush to rebuild and patch. It sounds simple, but when one shared tool like Unity is hit, the ripple spreads fast. Every game, every player, every update depends on that same foundation.</p>
<p>It is a solid reminder of how connected we all are. Shared tools mean shared risk, and when something breaks, it is not just one app or studio that feels it. Keeping software updated is a team effort between developers and users, even when the update notifications start to feel endless.</p>
<p><strong>Read more -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5MjU1MDI5MzgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIxN2Q1NGYzNGM3MDI2YTBkIn0" target="_blank" rel="noopener">https://www.securityweek.com/microsoft-and-steam-take-action-as-unity-vulnerability-puts-games-at-risk/</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Shared platforms, shared risk</strong><span> </span>– When one tool fails, the impact spreads far beyond its users.</li>
<li>
<p><strong>Patch fatigue</strong><span> </span>– The fixes will come, but that lag time keeps exposure alive.</p>
</li>
<li>
<p><strong>Supply chain dependency</strong><span> </span>– Modern games rely on layers of software that all need to be secure.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>AI and Creators: MrBeast Warns of “Scary Times” Ahead</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5MzM4OTE1NDgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI5MDg1MWU0MjcxNWY1NWZlIn0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=470</a></p>
<p>MrBeast, the world’s biggest YouTuber, says he’s genuinely worried about what AI means for content creators. With tools like OpenAI’s Sora and Google’s Veo now able to turn short text prompts into full, realistic videos, the internet is about to get flooded with machine-made content.</p>
<p>It’s not just about deepfakes or fake news anymore. The real question is what happens to creativity when anyone can generate polished videos in seconds. Robin Williams’ daughter has already pleaded with people to stop sending her AI clips of her dad, while Hollywood studios are pushing back against AI tools trained on copyrighted work.</p>
<p>The technology is incredible, but it is also unsettling. Authenticity is becoming the new currency online, and the creators who can stay human in a world full of fakes will stand out the most.</p>
<p><em>"Now you almost want to cut less and go for long meaningful shots, just to add authenticity and make it look more real to prove we’re not AI.”</em></p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5NDMzMjg3MzMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI0OTY5YjlmNTg2NGZhYWY5In0" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/cm2zmm0ry67o</a></p>
<p><strong>∠The Awareness Angle</strong><strong></strong></p>
<ul>
<li>
<strong>Creative authenticity</strong><span> </span>– As AI content grows, human emotion and originality matter more than ever.</li>
<li>
<p><strong>Ethical AI use</strong><span> </span>– Training models on other people’s work without permission crosses a line.</p>
</li>
<li>
<p><strong>Adapt or vanish</strong><span> </span>– The creators who learn to work with AI, not against it, will define what comes next.</p>
</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>Teenagers Arrested After Cyber Attack on London Nurseries</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5NTE3MTczNDIsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIyYzMxNzQ3ZDViODU1NDNhIn0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=763</a></p>
<p>Two 17-year-olds have been arrested after a cyber attack on Kido, a chain of London nurseries, exposed the personal details of around 8,000 children. The hackers reportedly stole names, photos, and addresses, and even tried to post them online to demand ransom payments.</p>
<p>The data came from a third-party platform used to share updates and photos with parents. The company insists its own systems weren’t breached, but it shows how easily sensitive data can be exposed when multiple services are connected.</p>
<p>It’s a story that hits differently when it involves children. Parents expect trust, not threats. These incidents remind us that cybersecurity is more than systems and passwords. It’s about protecting people, especially those who can’t protect themselves.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5NTkwNTczNzUsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiYWIyMmJmNGU4ZjVlY2Q3In0" target="_blank" rel="noopener">https://www.theguardian.com/uk-news/2025/oct/07/man-teenage-boy-arrested-kido-nurseries-cyber-attack-london</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Third-party exposure</strong><span> </span>– Even trusted software can become a weak link.</li>
<li>
<p><strong>Emotional impact</strong><span> </span>– Breaches involving children leave lasting fear and mistrust.</p>
</li>
<li>
<p><strong>Trust by design</strong><span> </span>– When handling family or child data, transparency and strong safeguards are everything.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>Awareness Awareness</h2>
<h3>Security Champions Research Project</h3>
<p>If you run or support a Security Champions or Ambassador Programme, this one’s for you. The team at Layer 8 are running an open-source research project throughout October to better understand what makes these programmes work.</p>
<p>They’re looking to uncover:</p>
<ul>
<li>
<p>What the most successful programmes have in common</p>
</li>
<li>
<p>The biggest challenges and how organisations are overcoming them</p>
</li>
<li>
<p>How teams measure the impact of their champions</p>
</li>
<li>
<p>What real-world results these programmes are delivering</p>
</li>
</ul>
<p>The goal is to create a shared, open dataset that anyone in the community can use. Your contribution is completely anonymous, and the insights could help raise the bar for champion networks everywhere.</p>
<p>Take a few minutes to add your experience at the link below -</p>
<p><span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5NjYzOTc0MDksXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI5OGM2MmQ4YWRjYWYyODA1In0" target="_blank" rel="noopener">https://layer8champions.scoreapp.com/</a></span></p>
<p>Watch the discussion –<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5NzE2NDAyOTAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI1Mzc2NjQ3NzQ4ZTY5MWE0In0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=2059</a></p>
<p></p>
<h3>Human Firewall Conference</h3>
<p>The Human Firewall Conference (HuFiCon) takes place in Cologne this November, bringing together awareness professionals, behaviour experts, and security leaders from across Europe. Hosted by SoSafe, it’s all about the human side of cyber — how we engage, motivate, and influence secure behaviour at scale.</p>
<p>Ant will be there, contributing to one of the sessions, and the line-up looks brilliant: from industry researchers to F1’s Ralf Schumacher. The event blends talks, panels, and interactive experiences in one of the most creative security awareness gatherings of the year.</p>
<p>If you work anywhere near human risk, culture, or awareness, this is one to get to.</p>
<p>Register at <span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5Nzg5ODAzMjMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiYWVlMzkyMmY5Zjg5NTY4In0" target="_blank" rel="noopener">http://www.humanfirewallconference.com/</a></span></p>
<p>Watch the discussion - <span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5ODUyNzE3ODAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiMzM3M2ZlZDdlZTRlNzNjIn0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=1919</a></span></p>
<h3></h3>
<h3>SANS Summit Awareness Chats</h3>
<p>The chats we recorded at the SANS Security Awareness Summit are proving to be a goldmine for awareness professionals. They capture real stories from people working in the field, talking openly about what works, what doesn’t, and the challenges they face day to day.</p>
<p>These conversations aren’t polished keynote moments. They’re honest, useful, and full of practical ideas you can take back to your own programme. From how to handle security fatigue, to adapting based on feedback, to making awareness feel personal, they’re a reminder that our best learning often comes from each other.</p>
<p>You can now watch the videos from the summit, short, focused, and designed to inspire your next step.  The last few will be released this week so subscribe to the YouTube channel to find out when it lands.  </p>
<p>You can watch the chats we've already released on YouTube - <span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5OTE1NjMyMzcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI4NzFkYWNlZTU2NTg3YzBlIn0" target="_blank" rel="noopener">https://youtube.com/playlist?list=PLEsOj51Q0PfBkhHwg2BTlxB6kfutJO1c3&amp;si=NX6fTLIZbWWgGB_E</a></span></p>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>This Week's Discussion Points...</h2>
<h3><strong>Main stories</strong></h3>
<p>Microsoft and Steam take action as Unity vulnerability puts games at risk<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTc5OTc4NTQ2OTUsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhZTkxMzJhMTBlOWMxMWM3In0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMDQxNDYxNTIsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhNzdmMGU0YmFiYzhkZmFjIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>MrBeast warns AI could spell “scary times” for creators<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMDkzODkwMzMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI3YTA1NWFmOGQxMDhiN2JmIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMTU2ODA0OTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2YWM1OTZlYTRjMmEzOGI3In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Zelda Williams slams AI videos of her dad, calling them disrespectful<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMjMwMjA1MjUsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIzMjI0OWU4YTk4NTZlNjFjIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMzAzNjA1NTksXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIwZDIzN2ZiNTdjODMzYzM3In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>OpenAI releases Sora 2 and faces backlash over content control<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwMzc3MDA1OTMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhMTZiZGJlOGQ5OWQxMmFlIn0" target="_blank" rel="noopener"><strong></strong></a><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwNDUwNDA2MjYsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiMGJmNGYwOGI2NDgxNGZjIn0" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwNTQ0Nzc4MTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI1MTlhMWJjZDZjZGFhZjk4In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Two teenagers arrested after cyber attack on London nurseries<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwNjI4NjY0MjEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiMGMyNjUwNGM3ZGZjZjNhIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwNzIzMDM2MDcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIwYmQxMmZjY2U3ODViMmZmIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Charlie Mackesy reveals much of his new book was lost when iPad was stolen<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwNzk2NDM2NDEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhNTM5YjY4MDljNjc0MTA5In0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwODgwMzIyNTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJlZmYzM2U2YTM1ODYxZTJjIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Puffin author website hijacked and replaced with adult content<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgwOTY0MjA4NjAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJjMGZmMDMxNjQ5YTBlZmUyIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxMDM3NjA4OTMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI4NjRhYTAwNmQzNjc4NWEzIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Discord confirms data breach after hackers steal ID photos<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxMTMxOTgwNzgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2ZjM1OWFhOGNmODlkNjg2In0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxMjA1MzgxMTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiMGUwMThkNGE0ZjJkMGRkIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>DraftKings warns of account breaches in credential stuffing attacks<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxMjc4NzcxMjAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2ZDA0YzNlOWM0NWQxZDNmIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxMzQxNjg1NzcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI2MDc1MzQzYjkxZmE0OWNiIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Salesforce ransom deadline hits as hackers claim 1.5B records<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNDE1MDg2MTAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI3Yzk4MWUzNzhkYTM1N2NlIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNDc4MDAwNjgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhNzUyOGE4Njc4OGU2ZjQ3In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3><strong>Awareness Awareness</strong></h3>
<p>HuFiCon – Human Firewall Conference, Cologne<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNTQwOTE1MzEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI3NjQ3OWZjNjM4NzRmNTQzIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNjAzODI5ODgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIzOWMzNzM2ODhlMjE5Y2U1In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Who Are The Champions? – Security Champions research project (Layer8)<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNjU2MjU4NzAsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJjZGJiMzc5OTg5NDQzYmRjIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNzE5MTczMjgsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJjZGM2MjVlNmNkMzY3Mzg5In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3><strong>Ant’s Topics</strong></h3>
<p>LinkedIn Recruiter Scams – Fake job offers and open-to-work bots<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxNzgyMDg3ODcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJjYmYzYWY3MTE0ODI4NjU3In0" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<p>AI Storytelling for Awareness – CyberGal Swati’s password story video<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxODQ1MDAyNDcsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiIzMTgzYzM3YWU5MjVlMjc0In0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgxOTE4NDAyODEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiNTUzZjJkMTNmN2RmZTVhIn0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Hifo.co – Search and compare cybersecurity vendors<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyMDAyMjg4OTIsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJlY2E5ODAwZGRjMTJmZjRhIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyMDg2MTc1MDIsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJlODFmOTdhMGQ4MmIyOWM1In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3><strong>Luke’s Topics</strong></h3>
<p>Instagram Maps – New feature raises privacy concerns<br><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyMTkxMDMyNjUsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI0OGU0MjNiNmRhOTMyMzMwIn0" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyMjY0NDMyOTksXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJhMTU0MzAxMjE4YTBiYTc1In0" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyMzQ4MzE5MTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiYmIzY2IzOWIyMDYzMzI3In0" target="_blank" rel="noopener"></a></strong></p>
<p><strong><span> </span>Subscribe to the Newsletter</strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyNTA1NjA1NjYsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiI3NDVmZDY4ODIzMzJhMDlkIn0" target="_blank" rel="noopener"><strong></strong></a></p>
<p><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyNTk5OTc3NTEsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJjMjFmZTRmMmM1ZWYwMDFjIn0" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>And finally…Ant's LinkedIn Recruiter Scams</h2>






















<span><img class="m_5300348226454986957img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NaCfQTuSOIjDO-uLDpScYPMyV4vJ5BLhRqWqry-Yu70GK0ETba7lUj5QvczgBbTAjvv7FwqfCG9wkq2cTnPXpKFKZ8RWJNRo_GwhhVGF63Ki6iTPLU-d3-052Fd-VwcMdh51xR1JLn-dznlV1HvQbcE=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/BHLRtSzw5LWbeDlEQaoS4243iPcDj46p7HUaJXpJ.png" width="540" onerror="this.style.display='none'"></span>

























<p>Watch the discussion - <span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjgxMzUwOTgyNzc4MjM1NjMsXCJyXCI6MTY4MTM1MTA4ODk4ODUwNTY2fSIsInMiOiJiN2NiMjdmMmY2NjMzNjY5In0" target="_blank" rel="noopener">https://youtu.be/Sp5kaCAexJ4?t=2517</a></span></p>
<p>The moment Ant switched his LinkedIn status to<span> </span><em>Open to Work</em>, the messages started flooding in. Within seconds, supposed “recruiters” were reaching out, complete with slick banners, impressive titles, and zero followers.</p>
<p>One was a “Chief HR Officer in Japan,” another an “Executive Director of Recruiting Operations” from Texas, all with the same pattern: no network, no real posts, and a suspiciously fresh<span> </span><em>#OpenToWork</em><span> </span>tag. When Ant checked back a week later, most had vanished, deleted by LinkedIn’s cleanup systems.</p>
<blockquote>
<p>“Within seconds I got one of them. It’s not even possible for you to have read my post before notifying me.”</p>
</blockquote>
<p>These fake profiles are part of a growing wave of recruitment scams that prey on people at vulnerable moments in their careers. They look legitimate, mimic real job titles, and often evolve into fake interview or verification requests that steal data or money.</p>
<p>If you’re job hunting, stop and verify before engaging. Check for mutual connections, profile history, and real company links. No legitimate recruiter will ask you for personal documents, money, or to move the conversation off-platform.</p>
<p>Luke summed it up best:<span> </span><em>“Must be just bots and scraping stuff.”</em></p>
<p>It’s a simple reminder that even the most professional-looking inbox can be full of traps.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Pause before you trust</strong><span> </span>– A professional title and friendly tone don’t make someone real.</li>
<li>
<p><strong>Verify outside the message</strong><span> </span>– Check company pages, connection history, and real contact details.</p>
</li>
<li>
<p><strong>Scammers exploit emotion</strong><span> </span>– Job searching can make people act fast; slow down and question the rush.</p>
</li>
</ul>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/167179?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/167179?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F167179%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F167179%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_165500">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/165500/watch_times"
  data-youtube-player-video-id-value="5ljNIpdbGuA"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/gp5vxnoz3sc50tbj1vjmnt76076t" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/165500">
          Oct 6, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/165500">
            Why Are Ransomware Victims Paying Millions But Still Losing Data?
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle:</p>
<ul>
<li>
<p>Harrods hit by another data breach as cyberattacks continue to pile up, with Renault, Dacia, and Asahi all reporting major incidents</p>
</li>
</ul>
<ul>
<li>Hackers behind the nursery data leak say they’ve deleted stolen images after public backlash, while criminals try to recruit a BBC journalist to help breach his own employer</li>
</ul>
<ul>
<li>Ransomware victims reveal the true cost of paying up, and Google warns of new extortion emails targeting Oracle customers</li>
</ul>
<p>Plus: UK users blocked from Imgur, Roblox removes 8 million games to boost child safety, the BBC covers burnout in cyber, and the government pushes Apple for access to UK user data</p>
<p><span> </span>Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>
<ul></ul>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_2894703488769097970img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_2894703488769097970img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>Cyber Security Awareness Month videos with Hoxhunt</h2>






















<span><img class="m_2894703488769097970img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again this year to create a series of short, snappy videos for Cyber Security Awareness Month. Each one is just one to two minutes long and covers social engineering in messaging apps, the psychology behind social engineering, how AI is powering spear phishing, and how to spot deepfakes. They’re quick, practical, and perfect for sharing with your colleagues, friends, or family. You can grab them directly from the<span> </span><a href="https://hoxhunt.com/cam-toolkit" target="_blank" rel="noopener">Hoxhunt toolkit</a>, and there are unbranded versions if you’d like to use them in your own awareness programmes.<br><br>Get the toolkit here - <a href="https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025#awareness-angle" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>





























<h2>This week's stories...</h2>
<h2>Hackers Offered a BBC Journalist 15% to Betray His Employer</h2>
<p>Watch the discussion - <a href="https://youtu.be/5ljNIpdbGuA?t=374" target="_blank" rel="noopener">https://youtu.be/5ljNIpdbGuA?t=374</a></p>
<p>It sounds like a movie plot, but it really happened. BBC cyber correspondent Joe Tidy was recently contacted by a criminal gang offering him a 15% share of any ransom payment, if he’d give them access to his BBC computer.</p>
<p><em>“Does the BBC even pay you much? Maybe ITV would pay you more — we can retire you.”</em></p>
<p>The gang even reassured him that the BBC’s security team “wouldn’t notice” and that they’d keep his secret. In reality, it was a classic insider recruitment attempt. A tactic we’re seeing more of as attackers realise that the easiest way into a network is through someone who already works there.</p>
<p>Joe, of course, didn’t take the bait. Instead, he reported it and shared screenshots in a BBC News article, showing how targeted, manipulative, and personal these approaches can be.</p>
<p>This story hits close to home for every organisation. Insider risk doesn’t always start with anger or intent as it can also begin with financial pressure, curiosity, or a single convincing message.</p>
<p><strong>Read more -<span> </span><a href="https://www.bbc.co.uk/news/articles/c3w5n903447o" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/c3w5n903447o</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Psychology over technology</strong><span> </span>- Attackers don’t need exploits if they can exploit people.</li>
<li>
</li>
<li>
<p><strong>Money and manipulation</strong> - Offers of wealth, status, or revenge are easy hooks when someone’s burnt out or undervalued.</p>
</li>
<li>
<p><strong>Culture as defence</strong> - Build an environment where people feel trusted, supported, and able to speak up early.</p>
</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>When Hackers Have a Conscience</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/5ljNIpdbGuA?t=749" target="_blank" rel="noopener">https://youtu.be/5ljNIpdbGuA?t=749</a></p>
<p>It’s not often you see cybercriminals say sorry, but that’s exactly what happened this week. The group behind the<span> </span><strong>Kiddo Schools ransomware attack</strong>, who leaked photos and data of nursery children, have now apologised and said they’ve deleted the material after huge public backlash.</p>
<p>Just days earlier, they were releasing stolen images and contacting parents directly, demanding a £600,000 ransom. Once the story hit national headlines and public outrage grew, they changed tone completely, first blurring photos, then removing them altogether.</p>
<p>As Ant said on the show, maybe this was guilt, or maybe they just realised they’d gone too far and the heat was on. When you start leaking children’s photos and ringing parents, you cross a moral line that even some criminals know draws attention they don’t want.</p>
<p>We also talked about how this didn’t sound like a sophisticated nation-state job. It felt more like a small group or typically younger attackers who panicked once they realised how big it had become. The data probably wasn’t worth much anyway, and with that level of media attention, disappearing quietly might have felt like their best option.</p>
<p>Either way, it’s a reminder that public empathy and pressure can still have power. Even in cybercrime, there are moments that break through the noise and make people stop.</p>
<p>Read more - <a href="https://www.theguardian.com/technology/2025/oct/02/kido-nursery-hackers-say-they-have-deleted-stolen-data" target="_blank" rel="noopener">https://www.theguardian.com/technology/2025/oct/02/kido-nursery-hackers-say-they-have-deleted-stolen-data</a></p>
<p><strong>∠The Awareness Angle</strong><strong></strong></p>
<ul>
<li>
<strong>Crossing the line</strong><span> </span>– Attacks that target children or families hit differently. They remind us what’s really at stake.</li>
<li>
<strong>Public pressure works</strong><span> </span>– When people care and speak out, it can shift behaviour in ways policy can’t.</li>
<li>
<strong>Teach empathy</strong><span> </span>– Awareness isn’t about fear, it’s about connection. When people understand who’s affected, they care more.</li>
</ul>
<ul></ul>






















<h2>Cyber Burnout Is Real</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/5ljNIpdbGuA?t=1635" target="_blank" rel="noopener">https://youtu.be/5ljNIpdbGuA?t=1635</a></p>
<p>The BBC ran a feature this week on burnout in cybersecurity, and it opened with a story about Ant. The piece explored how people across the industry are being asked to do more with less, and how that pressure is driving many towards exhaustion.</p>
<p>Ant has worked in cyber for more than a decade. While his focus is now on awareness and behaviour, he’s seen the long days and sleepless weekends that come with the job. He recalled the 2017 WannaCry outbreak, when he spent days on high alert trying to protect systems. “I was in my basement office that weekend,” he said. “The only window I had was tiny, like the size of a shoebox. I spent the whole weekend in the dark.”  Imagine what it's been like at M&amp;S, Co-Op or JLR?</p>
<p>When the BBC approached him for the story, Ant originally asked to remain anonymous. He now feels that decision says a lot about the stigma that still surrounds burnout and mental health in cybersecurity. He believes it’s important to talk about these experiences openly, because most people in the industry have been close to that line at some point.</p>
<p>The article, written by Joe Fay, also featured insights from ISC2’s CISO John France, who called burnout one of the sector’s biggest challenges. Cyber professionals rarely work nine to five, and even when they do, they’re still on call because attackers don’t clock off when we do.</p>
<p>As Ant said on the podcast, awareness teams aren’t immune either. The constant pressure to keep people safe, respond to incidents, and hold attention in an already noisy space can take a real toll. “If you think you’re close to burnout,” he said, “you’re probably not there yet — and you don’t want to find out where there really is.”</p>
<p>His message is simple. Sometimes the healthiest thing you can do for your organisation’s security is to step back. If you were off sick today, the world wouldn’t stop spinning. Mental health matters as much as physical health, and a healthy culture recognises that balance.</p>
<p>Read more - <a href="https://www.bbc.co.uk/news/articles/cgqn8e4e700o" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/cgqn8e4e700o</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Break the stigma</strong><span> </span>– Talking about burnout isn’t weakness. It’s leadership.</li>
<li>
<p><strong>Human sustainability</strong><span> </span>– Awareness, resilience, and wellbeing go hand in hand.</p>
</li>
<li>
<p><strong>Lead by example</strong><span> </span>– When leaders take a break, it gives everyone else permission to do the same.</p>
</li>
</ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>Awareness Awareness</h2>
<h3>Security Champions Research Project</h3>
<p>If you run or support a Security Champions or Ambassador Programme, this one’s for you. The team at Layer 8 are running an open-source research project throughout October to better understand what makes these programmes work.</p>
<p>They’re looking to uncover:</p>
<ul>
<li>
<p>What the most successful programmes have in common</p>
</li>
<li>
<p>The biggest challenges and how organisations are overcoming them</p>
</li>
<li>
<p>How teams measure the impact of their champions</p>
</li>
<li>
<p>What real-world results these programmes are delivering</p>
</li>
</ul>
<p>The goal is to create a shared, open dataset that anyone in the community can use. Your contribution is completely anonymous, and the insights could help raise the bar for champion networks everywhere.</p>
<p>Take a few minutes to add your experience at the link below -</p>
<p><span><a href="https://layer8champions.scoreapp.com/" target="_blank" rel="noopener">https://layer8champions.scoreapp.com/</a></span></p>
<p>Watch the discussion –<span> </span><a href="https://youtu.be/5ljNIpdbGuA?t=2152" target="_blank" rel="noopener">https://youtu.be/5ljNIpdbGuA?t=2152</a></p>
<h3></h3>
<h3>SANS Summit Awareness Chats</h3>
<p>The chats we recorded at the SANS Security Awareness Summit are proving to be a goldmine for awareness professionals. They capture real stories from people working in the field, talking openly about what works, what doesn’t, and the challenges they face day to day.</p>
<p>These conversations aren’t polished keynote moments. They’re honest, useful, and full of practical ideas you can take back to your own programme. From how to handle security fatigue, to adapting based on feedback, to making awareness feel personal, they’re a reminder that our best learning often comes from each other.</p>
<p>You can now watch the videos from the summit, short, focused, and designed to inspire your next step.  The last few will be released this week so subscribe to the YouTube channel to find out when it lands.  </p>
<p></p>
<p>You can watch the chats we've already released on YouTube - <span><a href="https://youtube.com/playlist?list=PLEsOj51Q0PfBkhHwg2BTlxB6kfutJO1c3&amp;si=NX6fTLIZbWWgGB_E" target="_blank" rel="noopener">https://youtube.com/playlist?list=PLEsOj51Q0PfBkhHwg2BTlxB6kfutJO1c3&amp;si=NX6fTLIZbWWgGB_E</a></span></p>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>This Week's Discussion Points...</h2>
<h3><strong>Main stories</strong></h3>
<p>Harrods says customers’ data stolen in IT breach<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=112s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/c8d70d912e6o" target="_blank" rel="noopener">Read</a></strong></p>
<p>Renault and Dacia cyber attack: customer phone numbers and addresses stolen from third party<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=112s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.autoexpress.co.uk/news/367948/renault-cyber-attack-customer-phone-numbers-and-addresses-stolen-third-party" target="_blank" rel="noopener">Read</a></strong></p>
<p>Japanese brewing giant Asahi hit by cyber-attack<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=195s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://industrialcyber.co/manufacturing/brewer-asahi-suspends-domestic-operations-after-cyberattack-disrupts-ordering-and-shipping/" target="_blank" rel="noopener">Read</a></strong></p>
<p>Cyber attacks: 80% of ransomware victims pay up, insurer says<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=253s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://news.sky.com/story/cyber-attacks-80-of-ransomware-victims-pay-up-insurer-says-13441131" target="_blank" rel="noopener">Read</a></strong></p>
<p>“You’ll never need to work again”: Criminals offer reporter money to hack BBC<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=378s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/c3w5n903447o" target="_blank" rel="noopener">Read</a></strong></p>
<p>Hackers say they have deleted children’s pictures and data after nursery attack backlash<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=747s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.theguardian.com/technology/2025/oct/02/kido-nursery-hackers-say-they-have-deleted-stolen-data" target="_blank" rel="noopener">Read</a></strong></p>
<p>Hackers are sending extortion emails to executives after claiming Oracle apps’ data breach<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=1136s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://techcrunch.com/2025/10/02/hackers-are-sending-extortion-emails-to-executives-after-claiming-oracle-apps-data-breach/" target="_blank" rel="noopener">Read</a></strong></p>
<p>Imgur blocks access to UK users after proposed regulatory fine<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=1355s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://mashable.com/article/why-imgur-is-blocked-in-the-uk" target="_blank" rel="noopener">Read</a></strong></p>
<p>Why burnout is a growing problem in cyber-security<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=1668s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/cgqn8e4e700o" target="_blank" rel="noopener">Read</a></strong></p>
<p>Government targets UK Apple users in new demand for data<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2027s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.esecurityplanet.com/news/the-uks-renewed-clash-with-apple-over-encrypted-data-access/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Awareness Awareness</strong><br>Who Are The Champions? – Security Champions research project (Layer8)<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2152s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://layer8champions.scoreapp.com/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Ant’s Topics</strong><br>Staff are pasting sensitive data into ChatGPT<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2365s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.reddit.com/r/sysadmin/s/0tFe5OjyxV" target="_blank" rel="noopener">Read</a></strong></p>
<p>The best password managers to secure your digital life<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2629s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.wired.com/story/best-password-managers/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Luke’s Topics</strong><br>AI deepfakes: Wan 2.2 Animate<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2769s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://vm.tiktok.com/ZNdGe6ey2/" target="_blank" rel="noopener">Watch on TikTok</a></strong></p>
<p>AI video generation: OpenAI Sora 2<br><strong><a href="https://www.youtube.com/watch?v=5ljNIpdbGuA&amp;t=2978s" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.tiktok.com/@openai/video/7555945531621559566?q=Sora%202&amp;t=1759500428783" target="_blank" rel="noopener">Watch on TikTok</a></strong></p>
<p><strong><a href="https://mashable.com/article/cookie-consent-pop-ups-eu-looking-to-change-law?utm_source=tldrdesign" target="_blank" rel="noopener"></a></strong></p>
<p><strong><span> </span>Subscribe to the Newsletter</strong><a href="https://www.magonia.io/what-framing-security-alerts-as-a-binary-true-or-false-positive-is-costing-you" target="_blank" rel="noopener"><strong></strong></a></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>And finally…The Internet Just Got Harder to Believe</h2>






















<span><img class="m_2894703488769097970img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NYnTowh9j5cDGZsBoCwmbLkgEj2cgH-dsfFJwmMdc1O6g6_suJNM0TkyfJRjRFEu0XEjSn9fSFfbZ0ib0YRtfWsmgtzlj8-4hooJ8BkCHb1thb_WU_NoYVwsY1QeS5SY80P1WZvj2jj2pdXSF08_Y5X=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/YfMPcApkhCMHIEUts5juDfWTFAUhlA9ZfvNDO1Sc.png" width="540" onerror="this.style.display='none'"></span>

























<p>Watch the discussion - <span><a href="https://youtu.be/5ljNIpdbGuA?t=2769" target="_blank" rel="noopener">https://youtu.be/5ljNIpdbGuA?t=2769</a></span></p>
<p>AI-generated video is moving faster than most people realise. On the show this week, Luke shared two clips that had us both staring at the screen in disbelief.</p>
<p>The first was from<span> </span><strong>Wan 2.2 Animate</strong>, which takes a single still image and turns it into a moving person with matching gestures, expressions and lighting. The original video showed a man talking, and the AI version transformed him into a woman in real time. Even the hand movements matched. It wasn’t perfect, but drop the resolution a little and it would easily pass as genuine.</p>
<p>The second was from<span> </span><strong>OpenAI’s Sora 2</strong>, which creates full video scenes from text prompts. One clip showed a figure skater spinning across the ice with a cat balanced on her head. It looked surreal, but also completely believable. The quality, the motion, even the reflections on the ice, all looked real.</p>
<p>As Luke pointed out, what’s most unsettling is how quickly this is improving. The text and physics still have flaws, but they’re shrinking by the month. I said on the show, it’s never going to get worse than it is today. It’s only going to get better from here, and that’s the scary part.</p>
<p>For awareness teams, this isn’t just a curiosity. It’s the next phase of social engineering. Deepfakes won’t just spread misinformation, they’ll power scams, voice calls and fake meetings that feel entirely authentic.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li><strong>Believability is the weapon<span> </span>– The tech doesn’t have to be perfect, it just has to feel real.</strong></li>
<li>
<strong>Slow down</strong><span> </span>– If something shocks you, pause before reacting or sharing.</li>
<li>
<strong>Teach verification</strong><span> </span>– Check sources, reverse search, and question anything that feels too perfect.</li>
</ul>

























</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/165500?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/165500?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F165500%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F165500%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_163887">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/163887/watch_times"
  data-youtube-player-video-id-value="_d_U0lnxO3Y"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/prp6lslambzjiq8ld05yuy1b8emy" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/163887">
          Sep 29, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/163887">
            Children’s Data Stolen from Nursery Published on Dark Web
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle:</p>
<ul>
<li>
<p>UK government pushes ahead with a compulsory digital ID scheme, raising big questions over privacy, access, and trust</p>
</li>
<li>
<p>Hackers breach a nursery chain, leaking children’s profiles and even calling parents to pressure a ransom</p>
</li>
<li>
<p>Cybercriminals ramp up attacks on law firms, exploiting weak systems to grab sensitive client data</p>
</li>
</ul>
<p>Plus: npm cracks down on package security, Gartner claims deepfake phone scams are everywhere, and cookie pop-ups might finally be on the way out</p>
<ul></ul>
<p><span> </span>Listen on your favourite podcast platform - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzNjMzMjgwNTIsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI3NDRlYmY2YjMwMDI5OTA2In0" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzNjc1MjIzNTcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJhZmEyNzdmN2JmYjJlZTYzIn0" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzNzI3NjUyMzksXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJmYzFiMzg1OTAzOTk2NzQzIn0" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzNzY5NTk1NDUsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJlMmFlNzlmNTVmZTE1YTNhIn0" target="_blank" rel="noopener"><span><img class="m_-5530150876388488158img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzODExNTM4NTAsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI5YmUwMjk2N2EzZjdiOGFlIn0" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzODQyOTk1NzksXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiYzNjZjcyNzg2OTIwNWQzIn0" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzODc0NDUzMDksXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI5YWFiOTRiNWIwMmNhZDhmIn0" target="_blank" rel="noopener"><span><img class="m_-5530150876388488158img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>Cyber Security Awareness Month videos with Hoxhunt</h2>






















<span><img class="m_-5530150876388488158img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again this year to create a series of short, snappy videos for Cyber Security Awareness Month. Each one is just one to two minutes long and covers social engineering in messaging apps, the psychology behind social engineering, how AI is powering spear phishing, and how to spot deepfakes. They’re quick, practical, and perfect for sharing with your colleagues, friends, or family. You can grab them directly from the<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzOTE2Mzk2MTQsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJhMmRjMWFkNjk0MDdiMjE0In0" target="_blank" rel="noopener">Hoxhunt toolkit</a>, and there are unbranded versions if you’d like to use them in your own awareness programmes.<br><br>Get the toolkit here - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzOTQ3ODUzNDMsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI4NGRlZTliNzNmOTEzZjM1In0" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>





























<h2>This week's stories...</h2>
<h2>UK Digital ID scheme announced</h2>
<p>Watch the discussion - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjIzOTg5Nzk2NDgsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJmZjBmNTE1ZDEzNzlkNzc3In0" target="_blank" rel="noopener">https://youtu.be/_d_U0lnxO3Y?t=861</a></p>
<p>Prime Minister Keir Starmer has confirmed plans for a compulsory UK-wide digital ID scheme, positioned as a way to modernise public services and tackle illegal working. A consultation will look at how it could be made accessible to people without smartphones or passports, with government figures pointing to countries like Estonia as examples of how such systems can underpin everyday life. Supporters say a digital ID could streamline everything from renting a flat to applying for childcare.</p>
<p>But the proposal has already sparked fierce opposition from civil liberties groups and political opponents who argue it’s intrusive, unworkable, or a distraction from more pressing issues. A centralised system of identity raises huge questions around surveillance, resilience, and trust, especially if one outage could lock millions of people out of work, healthcare, or banking. Like any major shift in how citizens prove who they are, it’s likely to attract misinformation and confusion. Communicating the real purpose and limits of the scheme will be a huge challenge for government, and educating people clearly will be just as important as the technology itself.</p>
<p><strong>Read more -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MDIxMjUzNzcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI3YTQ5ZjQxOTVmN2UxYTljIn0" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/c4g54g6vgpdo</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Privacy and trust</strong><span> </span>– Citizens need to know how their most personal data will be stored, accessed, and protected.</li>
<li>
<p><strong>Access and exclusion</strong><span> </span>– Those without digital devices or technical skills must not be locked out of essential services.</p>
</li>
<li>
<p><strong>Security and reliability</strong><span> </span>– A national ID scheme creates a single, tempting target for attackers and outages alike.</p>
</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>Hackers Target UK Nursery Chain</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MDYzMTk2ODMsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiMTFhYjAxNWRmYzRmZGU4In0" target="_blank" rel="noopener">https://youtu.be/_d_U0lnxO3Y?t=1142</a></p>
<p>Hackers calling themselves Radiant have breached the Kido nursery chain, stealing and publishing sensitive profiles of children, parents, and staff. In a disturbing twist, they even phoned parents directly to pressure the company into paying a ransom, taking the threat out of boardrooms and into family homes. Kido has confirmed the attack, while pointing to the childcare software provider Famly as the source, though Famly denies its systems were compromised.</p>
<p>This one feels different. We often talk about financial data or business disruption, but this is children’s names, photos, and family details being posted online. It shows that criminals don’t care about the emotional impact of their actions, only the leverage they can get. The backlash has been fierce, with many saying targeting nurseries crosses a line, but lines don’t really exist for groups motivated purely by money. For families caught up in this, the fear and distress go well beyond the usual narrative of “data breach.”</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MTA1MTM5ODgsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJjYzFmZmU2NTdlZDUwZmQwIn0" target="_blank" rel="noopener">https://www.malwarebytes.com/blog/news/2025/09/hackers-threaten-parents-get-nursery-to-pay-ransom-or-we-leak-your-childs-data</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Escalation of tactics</strong><span> </span>– Directly contacting parents shows how ransomware groups are turning up the pressure.</li>
<li>
<p><strong>Children’s data at risk</strong><span> </span>– Even the most sensitive and personal information can be exploited when criminals see value.</p>
</li>
<li>
<p><strong>Third-party software risk</strong><span> </span>– The breach highlights how supply-chain weaknesses can spill over into childcare and education.</p>
</li>
</ul>
<ul></ul>






















<h2>Cybercriminals Target Law Firms</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MTM2NTk3MTcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI0NjI3OTU3MTc2NzJmZjA4In0" target="_blank" rel="noopener">https://youtu.be/_d_U0lnxO3Y?t=1337</a></p>
<p>Cybercriminals are increasingly going after law firms, drawn to the treasure trove of sensitive client data they hold. From financial records and ID documents to contracts and legal strategies, it’s a goldmine for anyone who manages to get in. Weak passwords, outdated systems, and a lack of staff training are making it far too easy. Recent reports suggest that around one in five law firms has faced a cyberattack in the last year, and some of those breaches have already led to lawsuits and costly settlements.</p>
<p>What makes this especially worrying is how normalised it has become to email highly sensitive information to a solicitor, proof of ID, bank account details, property contracts, without ever really knowing how secure their systems are. Smaller firms may be particularly at risk, running on ageing tech and limited budgets. And while AI is helping some practices streamline work, it’s also arming attackers with tools like deepfakes and more convincing social engineering. For an industry built on trust, the risks are only getting sharper.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MTc4NTQwMjIsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIwZjlmZDA4NTQ3NDgwOTEwIn0" target="_blank" rel="noopener">https://www.helpnetsecurity.com/2025/09/23/law-firms-cyberthreats/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Human factor</strong><span> </span>– Phishing, vishing, and social engineering remain the easiest way into legal systems.</li>
<li>
<p><strong>Tech hygiene</strong><span> </span>– MFA, regular patching, and proper access controls are non-negotiable for protecting client data.</p>
</li>
<li>
<p><strong>AI as a threat</strong><span> </span>– Deepfakes and AI-enabled scams are raising the stakes for an industry that can’t afford to get it wrong.</p>
</li>
</ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>Awareness Awareness</h2>
<h3>SANS Security Awareness Summit 2025 – Videos Now Live</h3>
<p>If you work in awareness or you’re just curious about how the best in the industry do it, the SANS Security Awareness Summit is the place to look. Every talk from this year’s summit is now on YouTube, covering everything from culture and psychology to storytelling and phishing simulations. With 350 people in the room and over 4,000 watching online, it’s the biggest event of its kind.</p>
<p>There are plenty of gems, but one that really stood out was Erin West’s keynote on nation-state scams. What used to be called pig butchering has evolved into large-scale romance scams run like industrial operations, with jaw-dropping evidence and a delivery that had the whole room gasping. It’s the kind of talk that could easily be a BBC documentary. If you only watch one video, make it that one, but honestly, the whole playlist is worth your time.</p>
<p>Watch the full playlist –<span> </span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MjMwOTY5MDQsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiMGJlNWE1NGIwZDdlN2M1In0" target="_blank" rel="noopener">https://www.youtube.com/playlist?app=desktop&amp;list=PL_zMFkM-50Ub7R5x6mrl0p0xQqgUzlKlL</a></p>
<h3>Coming up on Risky Creative</h3>
<p>We’ll be releasing more interviews we recorded at the summit over the next week on our YouTube channel. These include conversations with vendors and awareness professionals, each offering a different take on the challenges and opportunities in our field. Keep an eye out, they’ll be dropping daily.</p>
<p>You can watch the chats we've already released on YouTube - <span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MjYyNDI2MzMsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIyOTFlOGI0MGQxNTAzMzExIn0" target="_blank" rel="noopener">https://www.youtube.com/playlist?list=PLEsOj51Q0PfBkhHwg2BTlxB6kfutJO1c3</a></span></p>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>This Week's Discussion Points...</h2>
<h3> News</h3>
<p>Jaguar Land Rover cyberattack halts production, supply chain hit hard<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0MzI1MzQwOTAsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiNWFiMTkxNTk5OTViNDFlIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0Mzc3NzY5NzEsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiOTczMjQ0ZTRhYzc3OTg5In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Ransomware disrupts major European airports via Collins Aerospace software<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NDE5NzEyNzcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJlOTgzNjAxNmU1OWI2Mzk3In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NDcyMTQxNTgsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJmZDY0MjY4OGE0MzVjMzA4In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>UK government to launch compulsory digital ID scheme<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NTM1MDU2MTUsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiOWVmNTNjZWMxMDdiNTExIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NTc2OTk5MjAsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiYzNlMjFjOTUwN2NiZDkwIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Hackers threaten to leak children’s data from Kido nurseries<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NjE4OTQyMjUsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIzM2JmNTRiYzkwMzk0ZWI5In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NjYwODg1MzAsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIxNzM1YjcyNWVhYmU1YzZlIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Law firms increasingly targeted for sensitive client data<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NzAyODI4MzUsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJlMjg2ZTc0NTkwNzAzNmUwIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0NzU1MjU3MTYsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIyNzYxN2VhNjQyZDU1NWI5In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>GitHub strengthens npm supply chain security after worm attacks<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0Nzg2NzE0NDUsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI5ZDcyNjQyMTJlYzFjNmI4In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0ODI4NjU3NTEsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIyYmVhYWQ0NDBlOGY4NTI4In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Nearly half of businesses report deepfake audio attacks on staff<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0ODcwNjAwNTcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiNDgzNmI3NjM5YjkyYzgzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0OTIzMDI5MzgsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJlODNkMjg4ZGExMmZmOWVlIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Tired of cookie pop-ups? EU looks to scrap consent overload<br><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI0OTc1NDU4MTksXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI2NTJlNjk0ZjhmNDlhYTk4In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MDM4MzcyNzcsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJhNzhjYWRhYTZhNjNhNTFmIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong><a target="_blank" rel="noopener"></a></strong></p>
<p><strong><span> </span>Subscribe to the Newsletter</strong><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MDkwODAxNTgsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIyMWVjMzdjZGJjZDRkOTMwIn0" target="_blank" rel="noopener"><strong></strong></a></p>
<p></p>
<p><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MTMyNzQ0NjMsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJjMDE4NGJjNzYzMDYxMTIxIn0" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>And finally…Cookie Pop-Ups Could Soon Disappear</h2>






















<span><img class="m_-5530150876388488158img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_Na0DRJqjCTNPQ6Ztijz8wslnFSbpi1XxsML_LBA4QQRoXI4FC5lkOMhQ4BhrX_pE-EIKhF0jKr0qGDqPYB8Hn_UGtoaVpgRRJhgkA_UtLGBcdyT7D1YDTq4TL1rxhUZJ07Xne2xY-7fjWyF1NgPUwGM=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/PUEXFZeCKJcGeN9Bk6fW2nJxWnWnfwMinVVU6FS2.png" width="540" onerror="this.style.display='none'"></span>

























<p>Watch the discussion - <span><a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MjI3MTE2NDksXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiJiZjYyM2Y0ZTlkOWZlZjgxIn0" target="_blank" rel="noopener">https://youtu.be/_d_U0lnxO3Y?t=2428</a></span></p>
<p>Good news for anyone who’s sick of clicking “accept” every time they open a website — the EU is looking at scrapping the rules that created cookie pop-ups in the first place. The 2009 e-Privacy Directive was supposed to give people more control over their data, but instead it’s left us drowning in banners. Now regulators are talking about letting people set their preferences once in their browser and be done with it.</p>
<p>It sounds small, but it could change how billions of us experience the internet. Privacy groups are already worried it’ll mean more tracking with less say for users, while businesses argue it’s about time we ditched the pop-up overload. And honestly, that’s the story of cyber in a nutshell — everything ends up as a fight between compliance and convenience. The trick is finding a balance that doesn’t annoy everyone while still keeping our data safe.<a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MjY5MDU5NTQsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiI0YTM3Y2JjNzhkYjYxMGQ0In0" target="_blank" rel="noopener"></a></p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/ty/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjY4NTQ3MjI1MzExMDAyNjAsXCJyXCI6MTY2ODU0NzMyNjc5MjE4MjI4fSIsInMiOiIzNjhlNTJiNWY2ZGE3NzAxIn0" target="_blank" rel="noopener">https://www.politico.eu/article/eu-cookie-consent-rules-change/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>User experience vs privacy</strong><span> </span>– Fewer pop-ups could be great, but only if people still stay in control.</li>
<li>
<p><strong>Global impact</strong><span> </span>– EU rules usually spread far beyond Europe, so this could change things everywhere.</p>
</li>
<li>
<p><strong>Compliance vs convenience</strong><span> </span>– Cookie banners are just one example of the constant trade-off in security decisions.</p>
</li>
</ul>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/163887?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/163887?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F163887%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F163887%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_161676">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/161676/watch_times"
  data-youtube-player-video-id-value="CYJR7Oq6H7E"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/CYJR7Oq6H7E/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/161676">
          Sep 22, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/161676">
            From Cars to Chaos: Jaguar Land Rover Cyber Fallout
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle:</p>
<ul>
<li>UK background checker APCS suffers a breach, exposing passports and driving licences used for DBS checks</li>
<li>ShinyHunters claim 1.5 billion Salesforce records stolen, hitting more than 760 companies including Google and Cloudflare</li>
<li>Jaguar Land Rover halts production after a cyberattack, leaving suppliers and workers facing weeks without pay</li>
<li>Plus: Apple patches ancient iPhones, teenagers in hoodies charged over the TfL hack, and an AI comedy sketch that skewers vendor buzzwords in the extras</li>
</ul>
<p><span> </span>Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_1498263457972735851img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_1498263457972735851img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>


































































<h2>Cyber Security Awareness Month videos with Hoxhunt</h2>






















<span><img class="m_1498263457972735851img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again this year to create a series of short, snappy videos for Cyber Security Awareness Month. Each one is just one to two minutes long and covers social engineering in messaging apps, the psychology behind social engineering, how AI is powering spear phishing, and how to spot deepfakes. They’re quick, practical, and perfect for sharing with your colleagues, friends, or family. You can grab them directly from the<span> </span><a href="https://hoxhunt.com/cam-toolkit" target="_blank" rel="noopener">Hoxhunt toolkit</a>, and there are unbranded versions if you’d like to use them in your own awareness programmes.<br><br>Get the toolkit here - <a href="https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025#awareness-angle" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>





























<h2>This week's stories...</h2>
<h2>APCS Data Breach Exposes Sensitive Identity Documents</h2>
<p>Watch the discussion - <a href="https://youtu.be/CYJR7Oq6H7E?t=300" target="_blank" rel="noopener">https://youtu.be/CYJR7Oq6H7E?t=300</a></p>
<p>UK criminal background checking firm APCS has confirmed a data breach after its software supplier, Intradev, was attacked. The incident may have exposed highly sensitive documents such as passports, driving licences, and National Insurance numbers, all tied to DBS checks for people working with children, vulnerable adults, or in financial services. APCS works with more than 19,000 organisations, though the true scale of those affected is still unclear.</p>
<p>The BBC initially reported the breach as limited to Guernsey which is why we didn't report on it but reports now suggest the impact is wider. It underlines just how fragile the chain of trust can be when it comes to third-party providers. Submitting identity documents has become routine for everything from job applications to volunteering, yet once those documents are out of our hands, control over where they end up is often lost.</p>
<p>There are also broader concerns about government policy. With online safety rules requiring citizens to provide ID to access certain services, breaches like this raise hard questions about how that data is protected, and what happens when it isn’t.</p>
<p><strong>Read more -<span> </span><a href="https://www.theregister.com/2025/08/22/apcs_breach/" target="_blank" rel="noopener">https://www.theregister.com/2025/08/22/apcs_breach/</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Third-party weakness</strong><span> </span>– A supplier compromise opened the door, showing how fragile the chain really is.</li>
<li>
<strong>Highly sensitive data</strong><span> </span>– This isn’t just email addresses. We’re talking identity documents that criminals can use for fraud.</li>
<li>
<strong>Government oversight</strong><span> </span>– The UK’s online safety rules now force people to submit ID to access sites, yet breaches like this raise serious questions about where that data ends up.</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>ShinyHunters Claim 1.5 Billion Salesforce Records Stolen</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/CYJR7Oq6H7E?t=790" target="_blank" rel="noopener">https://youtu.be/CYJR7Oq6H7E?t=790</a></p>
<p>The ShinyHunters group claim to have stolen<span> </span><em>1.5 billion</em><span> </span>Salesforce records from more than 760 companies. The way in was through OAuth tokens linked to Salesloft Drift, after secrets were discovered in GitHub repos earlier this year. From there, attackers were able to siphon huge amounts of Salesforce data.</p>
<p>Big names are caught up in this - Google, Cloudflare, Tenable, Palo Alto. Even companies whose whole business is security. And the exposure goes well beyond simple contact details. Salesforce support cases often contain credentials, AWS keys, and sensitive internal system notes, the sort of data that attackers can immediately put to use.</p>
<p>One detail that stands out is the attackers’ use of<span> </span><strong>TruffleHog</strong>, a legitimate security tool, to scan for secrets. It’s a reminder that the same tools used for defence are also available to attackers, and nothing is stopping them from turning those tools against us.</p>
<p>Read more - <a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<p><strong>Supply chain cascade</strong><span> </span>– A GitHub leak became a mass data theft campaign.</p>
</li>
<li>
<p><strong>Tokens as gold</strong><span> </span>– OAuth tokens can be as valuable as passwords, sometimes more.</p>
</li>
<li>
<p><strong>No one’s immune</strong><span> </span>– If Cloudflare and Palo Alto are in the list, anyone can be.</p>
</li>
</ul>
<ul></ul>






















<h2>Jaguar Land Rover Cyberattack Halts Production</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/CYJR7Oq6H7E?t=1292" target="_blank" rel="noopener">https://youtu.be/CYJR7Oq6H7E?t=1292</a></p>
<p>Jaguar Land Rover (JLR) is still struggling to recover from a cyberattack that has forced it to shut down IT systems and halt production at all UK factories. What started on September 1st, one of the busiest sales days of the year for new cars, has stretched into weeks of disruption, with some industry sources warning operations may not be fully restored until November. The outage is costing JLR millions per day and threatening billions in lost revenue if delays continue.</p>
<p>The impact is hitting far beyond JLR itself. Hundreds of smaller suppliers depend on the manufacturer, and many are already laying off staff or asking workers to apply for universal credit. For some, JLR is their only customer, and without production lines running, their survival is uncertain. Unite, the workers’ union, has described the situation as a crisis for thousands across the supply chain.</p>
<p>Researchers have linked the attack to groups associated with Scattered Spider, Lapsus$, and ShinyHunters. It's the same playbook seen in previous attacks on MGM, Marks &amp; Spencer, and others. What makes this case stand out is the human and economic fallout. Unlike a website outage, shutting down factories means machines stop, staff have nothing to do, and entire supply chains grind to a halt.</p>
<p>Read more - <a href="https://industrialcyber.co/manufacturing/jaguar-land-rover-cyberattack-deepens-with-prolonged-production-outage-supply-chain-fallout/" target="_blank" rel="noopener">https://industrialcyber.co/manufacturing/jaguar-land-rover-cyberattack-deepens-with-prolonged-production-outage-supply-chain-fallout/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Operational tech disruption</strong><span> </span>– Cyber incidents can literally turn off the production line.<br><br>
</li>
<li>
<strong>Supply chain fragility</strong><span> </span>– Smaller suppliers with no financial buffer are left most exposed.<br><br>
</li>
<li>
<strong>Wider economic fallout</strong><span> </span>– Thousands of jobs and billions in revenue are at risk when a major manufacturer goes offline.</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>ICO Jumps on TikTok During JLR Fallout</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/CYJR7Oq6H7E?t=1621" target="_blank" rel="noopener">https://youtu.be/CYJR7Oq6H7E?t=1621</a></p>
<p>One unexpected twist from the Jaguar Land Rover incident was the Information Commissioner’s Office (ICO) turning up on TikTok to talk about it. The video itself was as low-fi as it gets. Someone sat in a car with a handheld mic, no backdrop, no branding, just a quick message recorded in the same style as any other TikTok clip on your feed.</p>
<p>It might look rough, but that’s the point. Rather than trying to polish a corporate video, the ICO blended into the platform’s style and spoke directly to the audience where they already spend their time. For a regulator often seen as distant and formal, this is a bold move into relatable, human messaging.</p>
<p>Read more - <a href="https://www.tiktok.com/@informationcommissioner/video/7551817307400703234?_t=ZN-8zrd9gQta8Q&amp;_r=1" target="_blank" rel="noopener">https://www.tiktok.com/@informationcommissioner/video/7551817307400703234?_t=ZN-8zrd9gQta8Q&amp;_r=1</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Meet people where they are</strong><span> </span>– TikTok might not feel like a regulator’s natural home, but that’s exactly why it works.
<p></p>
</li>
<li>
<p><strong>Style over polish</strong><span> </span>– Content that looks like the rest of the feed can land better than something overproduced.</p>
</li>
</ul>
<span><br></span>
<ul>
<li>
<p><strong>A lesson for awareness pros</strong><span> </span>– Security messages don’t need a glossy studio; sometimes simple is more effective.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>Awareness Awareness</h2>
<p><strong>CyberSecure Leeds</strong><br>This Wednesday, 24 September, KnowBe4 are hosting<span> </span><em>CyberSecure Leeds 2025: When AI Strikes, Humans Defend</em><span> </span>as part of Leeds Digital Festival. Ant will be on a panel with Javad Malik, Jack Chapman, and James Dyer, discussing AI-driven threats, building resilience, and reducing phishing risk. If you’re in the north of England, it’s a great opportunity to join the conversation.</p>
<p>More information at <a href="https://leedsdigitalfestival.org/events/cybersecure-leeds-2025-when-ai-strikes-humans-defend/" target="_blank" rel="noopener">https://leedsdigitalfestival.org/events/cybersecure-leeds-2025-when-ai-strikes-humans-defend/</a></p>
<p><strong>HuFiCon agenda now live<br></strong>SoSafe’s Human Firewall Conference takes place in Cologne this November and the agenda has just been published. Ant will be attending the two-day event, which focuses on human risk and security culture, and features some excellent speakers. If you’re heading out too, let him know, it’s always good to connect. If you are located in Europe, it should be pretty affordable!</p>
<p>More information at <a href="https://humanfirewallconference.com/" target="_blank" rel="noopener">https://humanfirewallconference.com/</a></p>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>This Week's Discussion Points...</h2>
<h3>
<br> News</h3>
<p>Criminal background checker APCS faces data breach</p>
<p><a href="https://youtu.be/CYJR7Oq6H7E?t=300" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.theregister.com/2025/08/22/apcs_breach/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks<br><a href="https://youtu.be/CYJR7Oq6H7E?t=790" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Self-propagating supply chain attack hits 187 npm packages<br><a href="https://youtu.be/CYJR7Oq6H7E?t=1085" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Jaguar Land Rover cyberattack deepens, with prolonged production outage, supply chain fallout<br><a href="https://youtu.be/CYJR7Oq6H7E?t=1290" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://industrialcyber.co/manufacturing/jaguar-land-rover-cyberattack-deepens-with-prolonged-production-outage-supply-chain-fallout/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Apple backports zero-day patches to older iPhones and iPads<br><a href="https://youtu.be/CYJR7Oq6H7E?t=1899" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/apple-backports-zero-day-patches-to-older-iphones-and-ipads/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Fake Empire Podcast invites target crypto industry with macOS AMOS Stealer<br><a href="https://youtu.be/CYJR7Oq6H7E?t=2237" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://hackread.com/fake-empire-podcast-invites-crypto-macos-amos-stealer/?web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Teenagers charged over Transport for London cyber attack<br><a href="https://youtu.be/CYJR7Oq6H7E?t=2420" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bbc.co.uk/news/articles/c62z8k14kxxo" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>New attack on ChatGPT research agent pilfers secrets from Gmail inboxes<br><a href="https://youtu.be/CYJR7Oq6H7E?t=2638" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://arstechnica.com/information-technology/2025/09/new-attack-on-chatgpt-research-agent-pilfers-secrets-from-gmail-inboxes/?web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>As Ellison Buys Out TikTok, US Moves Toward One-Party Media<br><a href="https://youtu.be/CYJR7Oq6H7E?t=2866" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><strong><a href="https://fair.org/home/as-ellison-buys-out-tiktok-us-moves-toward-one-party-media/" target="_blank" rel="noopener">Read</a></strong></p>
<p></p>
<h3>
<span> </span>Extras</h3>
<p>CyberSecure Leeds 2025 – Leeds Digital Festival panel with Ant</p>
<p><a href="https://youtu.be/CYJR7Oq6H7E?t=3103" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://leedsdigitalfestival.org/events/cybersecure-leeds-2025-when-ai-strikes-humans-defend/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>HuFiCon agenda now live<br><a href="https://youtu.be/CYJR7Oq6H7E?t=3236" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://humanfirewallconference.com/agenda/?utm_campaign=DACH_ST_EV_HuFiCon_Q12025&amp;utm_medium=nurturing&amp;_hsenc=p2ANqtz-9PWKVWs3_JjoQvmNM86ktyc9n9CvjiicKYePZIeBklhqPd5uxUkhu0UMNRJrhQavenEQMBJP4pl7JYFtpRWvHuNaKp1A&amp;_hsmi=379668600&amp;utm_source=email" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>AI comedy sketch poking fun at vendor buzzwords<br><a href="https://youtu.be/CYJR7Oq6H7E?t=3236" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.instagram.com/reel/DN7qbsmjI_A/?igsh=bHc5OTdwaTZqNXAz" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Phil AI image edit demo: Trump &amp; Starmer “kiss”<br><a href="https://youtu.be/CYJR7Oq6H7E?t=3486" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.linkedin.com/feed/update/urn:li:activity:7373755196255920128/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong><br><span> </span>Subscribe to the Newsletter</strong><a href="https://www.magonia.io/what-framing-security-alerts-as-a-binary-true-or-false-positive-is-costing-you" target="_blank" rel="noopener"><strong></strong></a></p>
<p></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>
 

























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>And finally…Most vendors now</h2>






















<span><img class="m_1498263457972735851img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NYQW5Yg4HezJAZthXq14r-eNhqZC8RpweFxpGdNVFF_CxJuXfLaRTrytX1v4ipwYJ6vRUBJ4n5gorXncFEWmS9odTkbWsfbN4P4mZUy3yBNM59axPTSZCOq4m7XZkyPaoqNZZmRogMpSJ9Frn26DTMZ=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/TZsXjbE33osjlwLp95sYHkMn7XpjRfc5BJArRsQs.png" width="540" onerror="this.style.display='none'"></span>

























<p><a href="https://youtu.be/EhVCwtW6gQ0" target="_blank" rel="noopener"></a>We spotted something on LinkedIn this week that shows just how easy AI manipulation has become. Adversarial Physical Security Specialist, Phil Smith, took a photo of Donald Trump and Keir Starmer together and, with a single prompt, altered it so the two looked like they were about to kiss. The results were both bizarre and a little unsettling.</p>
<p>It’s a light-hearted example, but it highlights a serious issue: deepfakes don’t need Hollywood budgets anymore. Anyone with a free tool can now create realistic, or at least believable, images that change context and meaning entirely. What happens when the subject isn’t comedy, but politics, finance, or even your own executives?</p>
<p>Moments like this are a useful reminder to challenge what we see online, especially as manipulated media keeps getting easier to make and harder to spot.</p>
<p>Watch - <a href="https://www.linkedin.com/posts/phil-smith-554462255_i-had-to-see-this-now-you-can-too-ugcPost-7374794135070744576-Tlko/" target="_blank" rel="noopener">https://www.linkedin.com/posts/phil-smith-554462255_i-had-to-see-this-now-you-can-too-ugcPost-7374794135070744576-Tlko/</a></p>
<p>If you need to undo the nightmare fuel,<span> </span><a href="https://youtu.be/EhVCwtW6gQ0" target="_blank" rel="noopener">here's</a><span> </span>a little something.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
</li>
<li>
<strong>Deepfakes on demand</strong><span> </span>– Simple AI prompts can now twist real photos into convincing but false images, showing how easy it is to manipulate context.<br><br>
</li>
<li>
<strong>From comedy to concern</strong><span> </span>– While this one was light-hearted, the same tech could be used to create fake press conferences, financial announcements, or damaging rumours.</li>
<li>
<p><strong>Pause before you share</strong><span> </span>– If an image or video feels odd, double-check the source before passing it on. Not everything that looks real online actually is.</p>
</li>
</ul>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/161676?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/161676?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F161676%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F161676%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_159777">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/159777/watch_times"
  data-youtube-player-video-id-value="k4iTtfaLtaw"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/k4iTtfaLtaw/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/159777">
          Sep 15, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/159777">
            Apple Calendar Invites Are Being Turned Into Phishing Scams
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle:</p>
<ul>
<li>Apple’s iCloud calendar gets abused to send phishing emails that look all too real</li>
<li>
<p>Qantas cuts executive bonuses after a massive breach, showing leadership accountability in action</p>
</li>
<li>
<p>Nexar’s dashcam database is hacked, spilling video footage and GPS data into the wild</p>
</li>
<li>
<p>Huntress researchers get a rare inside look at how cyber attackers really operate</p>
</li>
<li>
<p>Plus: Plex suffers another breach, new awareness content from Hoxhunt, and more in the extras</p>
</li>
</ul>
<p><span><img class="an1" alt="🎧" src="https://fonts.gstatic.com/s/e/notoemoji/16.0/1f3a7/72.png" onerror="this.style.display='none'"></span><span> </span>Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_6731696421057383705img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_6731696421057383705img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>Cyber Security Awareness Month videos with Hoxhunt</h2>






















<span><img class="m_6731696421057383705img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again this year to create a series of short, snappy videos for Cyber Security Awareness Month. Each one is just one to two minutes long and covers social engineering in messaging apps, the psychology behind social engineering, how AI is powering spear phishing, and how to spot deepfakes. They’re quick, practical, and perfect for sharing with your colleagues, friends, or family. You can grab them directly from the<span> </span><a href="https://hoxhunt.com/cam-toolkit" target="_blank" rel="noopener">Hoxhunt toolkit</a>, and there are unbranded versions if you’d like to use them in your own awareness programmes.<br><br>Get the toolkit here - <a href="https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025#awareness-angle" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>





























<h2>This week's stories...</h2>
<h2>Apple Calendar Invites Are Being Turned Into Phishing Scams</h2>
<p>Watch the discussion - <a href="https://youtu.be/k4iTtfaLtaw?t=151" target="_blank" rel="noopener">https://youtu.be/k4iTtfaLtaw?t=151</a></p>
<p>Attackers have found a way to abuse Apple’s own iCloud calendar system to send phishing emails that look like they’re coming straight from Apple. By creating and sharing malicious calendar invites, scammers can bypass many email security filters. The example we saw was a fake PayPal invoice for $600, complete with an “@<a href="http://email.apple.com/" target="_blank" rel="noopener">email.apple.com</a>” sender address. Because the messages ride on Apple’s trusted infrastructure, they carry an extra layer of legitimacy, and that makes them harder to spot.</p>
<p><strong>Read more -<span> </span><a href="https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Trust can be exploited</strong><span> </span>– Just because an invite or email comes from a big name like Apple doesn’t mean it’s safe.</li>
<li>
<p><strong>Look closer before clicking</strong><span> </span>– Unexpected calendar invites, especially those with links or payment requests, should raise red flags.</p>
</li>
<li>
<p><strong>Report and delete</strong><span> </span>– If something feels off, don’t interact. Remove it and let IT or your security team know.</p>
</li>
</ul>
<ul></ul>






















<h2>Qantas cuts executive bonuses by 15% after a July data breach</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/k4iTtfaLtaw?t=362" target="_blank" rel="noopener">https://youtu.be/k4iTtfaLtaw?t=362</a></p>
<p>Qantas suffered a cyber attack in July that exposed data from 5.7 million customers. The breach has been linked to the Scattered Spider group, who have targeted multiple airlines this year. In response, Qantas announced a 15% cut to executive bonuses, despite reporting $1.5 billion in profit. It’s a rare example of leadership being held financially accountable for a security failure, and a strong signal that cybersecurity is a board-level responsibility.</p>
<p>Read more - <a href="https://securityaffairs.com/181954/data-breach/qantas-cuts-executive-bonuses-by-15-after-a-july-data-breach.html" target="_blank" rel="noopener">https://securityaffairs.com/181954/data-breach/qantas-cuts-executive-bonuses-by-15-after-a-july-data-breach.html</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Accountability matters</strong><span> </span>– Security isn’t just IT’s problem, it’s a leadership responsibility.</li>
<li>
<p><strong>Culture starts at the top</strong><span> </span>– When executives take a hit, it shows the whole organisation that protecting data is everyone’s job.</p>
</li>
<li>
<p><strong>Learn from mistakes</strong><span> </span>– Breaches happen, but how leaders respond sets the tone for resilience and trust.</p>
</li>
</ul>
<ul></ul>






















<h2>Nexar dashcam video database hacked</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/k4iTtfaLtaw?t=520" target="_blank" rel="noopener">https://youtu.be/k4iTtfaLtaw?t=520</a></p>
<p>Hackers broke into Nexar’s cloud storage, exposing around 130 terabytes of dashcam footage and metadata. The data included video clips, GPS locations, and driving insights uploaded automatically from connected Nexar devices. Beyond the privacy risk, the footage could be misused for stalking or tracking routines. Nexar also monetises this data by selling access to blurred images and road insights to third parties, raising further questions about what users actually sign up for when they connect a “smart” dashcam.</p>
<p>Read more - <span><a href="https://www.malwarebytes.com/blog/news/2025/09/nexar-dashcam-video-database-hacked" target="_blank" rel="noopener">https://www.malwarebytes.com/blog/news/2025/09/nexar-dashcam-video-database-hacked</a></span></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Your devices see more than you think</strong><span> </span>– Dashcams don’t just record accidents, they capture where you go, who’s with you, even conversations.</li>
<li>
<p><strong>Convenience vs. Risk</strong><span> </span>– Smart features like 4G uploads sound useful, but they increase exposure if data isn’t properly secured.</p>
</li>
<li>
<p><strong>Secure your data</strong><span> </span>– Keep devices updated, use unique credentials, and think twice about what you allow to be stored in the cloud.</p>
</li>
</ul>
<ul></ul>
<ul></ul>






















<h2>Attacker’s Blunder Gave Huntress a Rare Look Inside Their Operations</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/k4iTtfaLtaw?t=898" target="_blank" rel="noopener">https://youtu.be/k4iTtfaLtaw?t=898</a></p>
<p>Researchers at Huntress stumbled across exposed command-and-control servers and got a rare glimpse into the daily workings of a cybercrime group. The access revealed playbooks, stolen data, even real-time chats between attackers. It was like peeking behind the curtain at how professional and organised these operations have become. The blog post reads more like a story than a technical brief, making it a fascinating read for anyone curious about the business-like side of cybercrime.</p>
<p>Read more - <a href="https://www.huntress.com/blog/rare-look-inside-attacker-operation" target="_blank" rel="noopener">https://www.huntress.com/blog/rare-look-inside-attacker-operation</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Attackers are organised</strong><span> </span>– Cybercrime runs like a business, complete with processes, tools, and collaboration.</li>
<li>
<p><strong>Awareness is defence</strong><span> </span>– Understanding how attackers think helps us prepare and spot their tricks earlier.</p>
</li>
<li>
<p><strong>Every click counts</strong><span> </span>– These campaigns still rely on someone letting them in, so cautious habits remain the strongest shield.<strong></strong></p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>Awareness Awareness</h2>
<p><strong>CyberSecure Leeds</strong><br>On 24 September, KnowBe4 are hosting<span> </span><em>CyberSecure Leeds 2025: When AI Strikes, Humans Defend</em><span> </span>as part of Leeds Digital Festival. Ant will be on a panel with Javad Malik, Jack Chapman, and James Dyer, discussing AI-driven threats, building resilience, and reducing phishing risk. If you’re in the north of England, it’s a great opportunity to join the conversation.</p>
<p>More information at <span><a href="https://leedsdigitalfestival.org/events/cybersecure-leeds-2025-when-ai-strikes-humans-defend/" target="_blank" rel="noopener">https://leedsdigitalfestival.org/events/cybersecure-leeds-2025-when-ai-strikes-humans-defend/</a></span></p>
<p><strong>HuFiCon agenda now live<br></strong>SoSafe’s Human Firewall Conference takes place in Cologne this November and the agenda has just been published. Ant will be attending the two-day event, which focuses on human risk and security culture, and features some excellent speakers. If you’re heading out too, let him know, it’s always good to connect. If you are located in Europe, it should be pretty affordable!</p>
<p>More information at <span><a href="https://humanfirewallconference.com/" target="_blank" rel="noopener">https://humanfirewallconference.com/</a></span></p>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Qfwq2z7EyFs?t=1320" target="_blank" rel="noopener">https://youtu.be/Qfwq2z7EyFs?t=1320</a></p>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>This Week's Discussion Points...</h2>
<h3>
<br>News</h3>
<p>iCloud Calendar abused to send phishing emails from Apple’s servers<br><a href="https://youtu.be/k4iTtfaLtaw?t=151" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><strong><span><a href="https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers/" target="_blank" rel="noopener">Read</a></span></strong></p>
<p>Qantas cuts executive bonuses by 15% after a July data breach<br><a href="https://youtu.be/k4iTtfaLtaw?t=362" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><strong><span><a href="https://securityaffairs.com/181954/data-breach/qantas-cuts-executive-bonuses-by-15-after-a-july-data-breach.html" target="_blank" rel="noopener">Read</a></span></strong></p>
<p>Nexar dashcam video database hacked<br><a href="https://youtu.be/k4iTtfaLtaw?t=520" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.malwarebytes.com/blog/news/2025/09/nexar-dashcam-video-database-hacked" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations<br><a href="https://youtu.be/k4iTtfaLtaw?t=898" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.huntress.com/blog/rare-look-inside-attacker-operation" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Plex suffers data breach, warns customers to change passwords<br><a href="https://youtu.be/k4iTtfaLtaw?t=1160" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://betanews.com/2025/09/09/plex-suffers-data-breach-warns-customers-to-change-passwords" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p></p>
<h3>
<br>Extras</h3>
<p>HuFiCon agenda now live<br><a href="https://youtu.be/k4iTtfaLtaw?t=1645" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://humanfirewallconference.com/agenda" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Reddit thread: Wildest breach stories you’ve been a part of<br><a href="https://youtu.be/k4iTtfaLtaw?t=2100" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.reddit.com/r/cybersecurity/s/nuzbso73Aw" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Framing security alerts beyond “true vs false positive”<br><a href="https://youtu.be/k4iTtfaLtaw?t=2385" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.magonia.io/what-framing-security-alerts-as-a-binary-true-or-false-positive-is-costing-you" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong><span></span></strong></p>
<p><strong>Subscribe to the Newsletter</strong></p>
<p></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>Phishing goes old school</h2>






















<span><img class="m_6731696421057383705img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NaxUzi_2I3n841MS-hGd4-tTs1FOAxndSDfe6XbXZjLb1ic4J1OmVGQg5RETXHiK71sumAxK6NcOt2qeHtOi3lz7uGNgTycPHo-G9AUPqJzvi__y5x6uJ7jkFFxg3u0PMHsqXY6IDCNlS1P-tv5iIgT=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/VZMQVbRXqMFt8zo4dEiLsaVnda2nhbzA8V09G1r2.png" width="540" onerror="this.style.display='none'"></span>

























<p>Ozan from Keepnet shared a phishing<span> </span><em>letter</em><span> </span>he received through the post, not an email, but an actual printed letter promising millions of dollars if he helped “claim” an unclaimed fortune. It’s basically the Nigerian prince scam with a new twist, and a good reminder that social engineering isn’t limited to inboxes. Sometimes it arrives in an envelope.</p>
<p>Watch - <a href="https://youtu.be/k4iTtfaLtaw?t=1750" target="_blank" rel="noopener">https://youtu.be/k4iTtfaLtaw?t=1750</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Old tricks, new packaging</strong><span> </span>– Scams don’t always arrive by email. Letters, phone calls, and texts can be just as dangerous.</li>
<li>
<p><strong>Too good to be true</strong><span> </span>– Promises of unexpected money are almost always a red flag, no matter how official the message looks.</p>
</li>
<li>
<p><strong>Check before you trust</strong><span> </span>– If something unexpected lands in your inbox or your letterbox, pause and question it before you respond.</p>
</li>
</ul>
<ul></ul>






















<h2>Guest Spot: AI Experience Podcast</h2>



















<p><a href="https://smartlink.ausha.co/ai-experience-eng/ai-scams-are-here-can-cybersecurity-keep-up" target="_blank" rel="noopener"></a>Ant recently joined Julien Redelsperger on the<span> </span><strong>AI Experience podcast</strong><span> </span>to talk about how AI is reshaping cybersecurity. From deepfake voices to flawless phishing emails, scams are getting harder to spot, and yet sometimes the best defence still comes down to analogue checks and trusting your instincts.</p>
<p>The episode is available on all major podcast platforms.  Click<span> </span><a href="https://smartlink.ausha.co/ai-experience-eng/ai-scams-are-here-can-cybersecurity-keep-up" target="_blank" rel="noopener">here</a><span> </span>to listen.</p>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/159777?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/159777?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F159777%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F159777%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_158364">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/158364/watch_times"
  data-youtube-player-video-id-value="Qfwq2z7EyFs"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/j5juqukfry10439bq71w8xvo2s54" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/158364">
          Sep 8, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/158364">
            700+ Companies Hit by SalesLoft Drift Hack, Are You At Risk?
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<span><img class="m_3316789177683667046img CToWUd a6T" alt="The Awareness Angle - The Newsletter" src="https://ci3.googleusercontent.com/meips/ADKq_Na4Zs85_a5rns91PttcAdYstlZjjOiWIJ-825IQQA4Ucbw3DKFq6CNNGXP41CxV5YY0cNDanX6vJo6SNSAs_k1RCEeCx2edb5c1dbhtjJsW1whNhdhcFNoqH7RzqCsN8SiWm8nQF01-l5pIERyQsfSw=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/t7HYs5fUyFMiwJKs8KXMHtnvxzKXHrGF1jAM0JLr.jpg" width="640" onerror="this.style.display='none'"></span>






















<h1>700+ Companies Hit by SalesLoft Drift Hack, Are You At Risk?</h1>
<p>This week’s news takes us from password managers with a hidden flaw to the first glimpse of AI-powered ransomware, and from Jaguar Land Rover’s production lines grinding to a halt to hackers pushing ultimatums at Google. Add in fallout from the Salesloft breach rippling across big-name security vendors, and it’s a week packed with stories that hit close to home.</p>
<p><span><img class="an1" alt="🎧" src="https://fonts.gstatic.com/s/e/notoemoji/16.0/1f3a7/72.png" onerror="this.style.display='none'"></span><span> </span>Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_3316789177683667046img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_3316789177683667046img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>


































































<h2>New Hoxhunt Videos for Cyber Awareness Month 2025 </h2>






















<span><img class="m_3316789177683667046img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbSFiumEesF1bmHSBN-EWWGC5aOunxJYs3-fQAbYQ2zIHsBePms4fUNWMrjKG6lgpxYMUOm3ucra2KxD0pceKeAnhnffUKWjPToVTMJ5EWJ2yq4-Eyir9b1ZkxS3nBiOjlqeV7z_awJ1YNW3lpxW31p=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/QeZOmw4AARaixUZSRujyjDYBI6mkhan7hgJYRGK0.png" width="540" onerror="this.style.display='none'"></span>

























<p>We’ve teamed up with Hoxhunt again to create a fresh set of short videos for their<span> </span><strong>2025 Cyber Awareness Month Toolkit</strong>. From spotting deepfakes to understanding social engineering in chat apps, these 1–2 minute clips are designed to be shared widely and spark awareness conversations.</p>
<p><br>Get the toolkit here - <a href="https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025#awareness-angle" target="_blank" rel="noopener">https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</a></p>



























































<h2>This week's stories...</h2>
<p></p>
<h2>Password Managers Under Attack</h2>
<p>Watch the discussion - <a href="https://youtu.be/Qfwq2z7EyFs?t=367" target="_blank" rel="noopener">https://youtu.be/Qfwq2z7EyFs?t=367</a></p>
<p>A new report has revealed a clickjacking flaw in major password manager browser extensions, including 1Password, Bitwarden, Dashlane, LastPass, NordPass and ProtonPass. The bug could expose sensitive details from up to 40 million users by tricking autofill into handing over data through invisible page overlays. Experts are stressing this isn’t a reason to ditch password managers, which remain one of the strongest defences against password reuse, but it is a reminder to tweak how you use them.</p>
<p><strong>Read more -<span> </span><a href="https://www.pcworld.com/article/2887955/password-managers-vulnerable-40-million-users-at-risk-of-stolen-data.html" target="_blank" rel="noopener">https://www.pcworld.com/article/2887955/password-managers-vulnerable-40-million-users-at-risk-of-stolen-data.html</a></strong></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<p><strong>Autofill off</strong><span> </span>– Turn off automatic autofill in your password manager and switch to manual “on-click” mode.</p>
</li>
<li>
<p><strong>MFA everywhere</strong><span> </span>– Keep two-factor authentication on for all accounts, especially your password manager.</p>
</li>
<li>
<p><strong>Don’t panic</strong><span> </span>– Password managers are still one of the best tools to keep your accounts secure. </p>
</li>
</ul>






















<h2>AI Ransomware Arrives: Meet PromptLock</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Qfwq2z7EyFs?t=653" target="_blank" rel="noopener">https://youtu.be/Qfwq2z7EyFs?t=653</a></p>
<p>Researchers have discovered<span> </span><strong>PromptLock</strong>, believed to be the first ransomware powered by artificial intelligence. Instead of relying on fixed malicious code, it runs an AI model locally on the victim’s machine to generate attack scripts on the fly. This makes it harder for traditional security tools to detect and block. For now, it looks more like a proof-of-concept than a widespread threat, but it shows how AI is being weaponised to make attacks smarter, faster and more adaptable.</p>
<p>Read more - <a href="https://cybersecuritynews.com/first-ai-ransomware/" target="_blank" rel="noopener">https://cybersecuritynews.com/first-ai-ransomware/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Proof of concept today</strong><span> </span>– PromptLock isn’t widespread yet, but it’s a sign of what’s coming.</li>
<li>
<p><strong>AI arms race</strong><span> </span>– Criminals are experimenting with AI just as much as defenders are.</p>
</li>
<li>
<p><strong>Stay prepared</strong><span> </span>– Basics like patching, backups, and detection tools remain the first line of defence.</p>
</li>
</ul>






















<h2>Cyber Attack Stalls Jaguar Land Rover</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Qfwq2z7EyFs?t=776" target="_blank" rel="noopener">https://youtu.be/Qfwq2z7EyFs?t=776</a></p>
<p>Jaguar Land Rover’s production was severely disrupted after a cyber attack forced systems offline on one of the busiest new car registration days in the UK. Employees were told not to return to work until systems were restored, and dealers had to fall back on manually phoning the DVLA to register new cars. Hackers claiming links to groups like Scattered Spider and ShinyHunters say they exploited a flaw in SAP NetWeaver, raising questions over patching and whether attackers had ever fully left the network after earlier incidents.</p>
<p>Read more - <a href="https://www.autocar.co.uk/car-news/new-cars/police-and-cyber-experts-brought-jlr-remains-crippled-hack" target="_blank" rel="noopener">https://www.autocar.co.uk/car-news/new-cars/police-and-cyber-experts-brought-jlr-remains-crippled-hack</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Business impact</strong><span> </span>– Cyber attacks don’t just steal data, they can stop production lines in their tracks.</li>
<li>
<p><strong>Patch management</strong><span> </span>– Known vulnerabilities remain one of the most common entry points.</p>
</li>
<li>
<p><strong>Persistence matters</strong><span> </span>– Attackers may already be inside, even after a previous breach is “fixed.”</p>
</li>
</ul>
<ul></ul>






















<h2>Salesloft Breach Ripples Across Big Vendors</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Qfwq2z7EyFs?t=1320" target="_blank" rel="noopener">https://youtu.be/Qfwq2z7EyFs?t=1320</a></p>
<p>A breach at Salesloft’s Drift chatbot platform has spilled over into some of the biggest names in cybersecurity. Attackers stole authentication tokens that connected Drift with tools like Salesforce, Google Workspace, AWS and Slack. So far, victims include Zscaler, Cloudflare, Palo Alto Networks, and more, and the list is still growing. Salesloft revoked all access and rotated tokens, while Google’s threat team linked the activity to a group known as UNC6395 (aka “Grub One”). For any business using Drift, the advice is simple: treat all tokens as compromised, rotate credentials, and review integrations for unusual activity.</p>
<p>Read more - <a href="https://www.crn.com/news/security/2025/5-cybersecurity-vendors-impacted-in-salesloft-drift-breach" target="_blank" rel="noopener">https://www.crn.com/news/security/2025/5-cybersecurity-vendors-impacted-in-salesloft-drift-breach</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Third-party risk</strong><span> </span>– Integrations add value, but also open cracks in your defences.</li>
<li>
<p><strong>Token takeover</strong><span> </span>– Authentication tokens are as valuable as passwords to attackers.</p>
</li>
<li>
<p><strong>Reset and review</strong><span> </span>– Revoke, rotate, and investigate whenever a connected service is hit.</p>
</li>
</ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>This Week's Discussion Points...</h2>
<p>Password managers vulnerable: 40 million users at risk<br><a href="https://youtu.be/Qfwq2z7EyFs?t=367" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://www.pcworld.com/article/2887955/password-managers-vulnerable-40-million-users-at-risk-of-stolen-data.html" target="_blank" rel="noopener">Read</a></p>
<p>First AI ransomware ‘PromptLock’ discovered<br><a href="https://youtu.be/Qfwq2z7EyFs?t=653" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://cybersecuritynews.com/first-ai-ransomware/" target="_blank" rel="noopener">Read</a></p>
<p>Jaguar Land Rover hit by cyber attack<br><a href="https://youtu.be/Qfwq2z7EyFs?t=776" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://www.autocar.co.uk/car-news/new-cars/hackers-who-hit-ms-claim-responsibility-jlr-cyber-attack" target="_blank" rel="noopener">Read</a></p>
<p>Salesloft breach grows bigger<br><a href="https://youtu.be/Qfwq2z7EyFs?t=1320" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://www.crn.com/news/security/2025/5-cybersecurity-vendors-impacted-in-salesloft-drift-breach" target="_blank" rel="noopener">Read</a></p>
<p>Reddit: Cyber Awareness Month phishing campaign ideas<br><a href="https://youtu.be/Qfwq2z7EyFs?t=1605" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://www.reddit.com/r/cybersecurity/s/d6pJem7UtW" target="_blank" rel="noopener">Read</a></p>
<p>Joe Rogan tricked by AI video<br><a href="https://youtu.be/Qfwq2z7EyFs?t=1805" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://www.reddit.com/r/JoeRogan/s/5WKEwDbyxF" target="_blank" rel="noopener">Read</a></p>
<p>Gemini photo prompt exploit<br><a href="https://youtu.be/Qfwq2z7EyFs?t=2020" target="_blank" rel="noopener">Watch</a><span> </span>|<span> </span><a href="https://vm.tiktok.com/ZNdVb9qoW/" target="_blank" rel="noopener">Read</a></p>
<p><a href="https://vm.tiktok.com/ZNdVb9qoW/" target="_blank" rel="noopener"></a></p>
<p></p>
<p><strong><span><img class="an1" alt="📬" src="https://fonts.gstatic.com/s/e/notoemoji/16.0/1f4ec/72.png" onerror="this.style.display='none'"></span><span> </span>Subscribe to the Newsletter</strong></p>
<p></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>
 
<p><a href="https://www.instagram.com/reel/DH6DhqNorAj/?igsh=cm54OHh0dXVkMTh1" target="_blank" rel="noopener"></a></p>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>Guest Spot: AI Experience Podcast</h2>






















<span><img class="m_3316789177683667046img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NZazPBOwWhO77Vnp7jObfGd6LHXIGQIRcq0BDJlv4EsG810CdGccJXCz8Z7Yp8D_NchjK0WBS4U0K9VfIuu7GKNXyiYNSGn9MzAS_93cqw7Rxikf1zaJhYKE1-ar_xFIAoFYy0eZm9WHxQwsQgh6GXQ=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/eSn2JX6meaNTRFSzEKGhERekbld1Ao46WfPesLbb.png" width="540" onerror="this.style.display='none'"></span>

























<p><span><a href="https://smartlink.ausha.co/ai-experience-eng/ai-scams-are-here-can-cybersecurity-keep-up" target="_blank" rel="noopener"></a></span>Ant recently joined Julien Redelsperger on the<span> </span><strong>AI Experience podcast</strong><span> </span>to talk about how AI is reshaping cybersecurity. From deepfake voices to flawless phishing emails, scams are getting harder to spot, and yet sometimes the best defence still comes down to analogue checks and trusting your instincts.</p>
<p>The episode is available on all major podcast platforms.  Click<span> </span><span><a href="https://smartlink.ausha.co/ai-experience-eng/ai-scams-are-here-can-cybersecurity-keep-up" target="_blank" rel="noopener">here</a></span><span> </span>to listen.</p>











</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/158364?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/158364?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F158364%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F158364%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_156603">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/156603/watch_times"
  data-youtube-player-video-id-value="v64EH9pK_w8"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/9jkvcg679f1bdozerw1349mpl51k" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/156603">
          Sep 1, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/156603">
            Grok Chatbot Leaks 370,000 Private Conversations
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week we’ve got leaks, lawsuits, and legislation. From Elon’s Grok chatbot spilling hundreds of thousands of private chats into Google search results, to Mac users being tricked by a fake “fix” that hides an info-stealer, to a developer jailed for sabotaging his ex-employer with a kill switch. Add in a major telecoms breach, Android’s new plan to verify every app developer, and Denmark pushing bold new deepfake laws, and there’s plenty to talk about.</p>
<p>Listen on your favourite podcast platform - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyMTc1NjI4NzYsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI1ZDllYTNlZDVmOTljYjMyIn0" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyMjI4MDU3NTgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJmOTdkYTcxNGQ0NmUxMzk1In0" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyMjgwNDg2NDAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIyNGUyNzI2Yzg4Yzc4NTdjIn0" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyMzMyOTE1MjIsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIwNTZhMjQ5Njk4MWUxNjY3In0" target="_blank" rel="noopener"><span><img class="m_6615620331083099690img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyMzg1MzQ0MDMsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIxMWFmNWYzMzNlMzkzN2NlIn0" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNDI3Mjg3MTAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJjYmFkNWJkOTVhODVlODFiIn0" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNDc5NzE1OTIsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI0MzYyOTkzZWMzODhlZTg0In0" target="_blank" rel="noopener"><span><img class="m_6615620331083099690img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>Hundreds of thousands of Grok chats exposed in Google results</h2>
<p>Watch the discussion - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNTMyMTQ0NzQsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIyODYwMzgzYWRhYWExY2RhIn0" target="_blank" rel="noopener">https://youtu.be/v64EH9pK_w8?t=127</a></p>
<p>Elon Musk’s Grok chatbot was caught up in a major privacy incident after more than 370,000 user conversations were found in Google search results. A flaw in the Share button meant chats that were supposed to be private were being indexed, making them accessible to anyone searching. The leaked conversations were not harmless either. They included medical information, passwords, and even instructions on making explosives. It follows similar incidents with other AI platforms earlier this year, raising serious questions about how much we can trust these tools with sensitive information.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNTc0MDg3NzksXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIwYTU1YzYyZmUyNThmM2FjIn0" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/cdrkmk00jy0o</a></p>
<p><strong>∠T</strong><strong>he Awareness Angle<br></strong></p>
<ul>
<li>
<strong>Privacy is not guaranteed</strong><span> </span>– AI chats may appear private but unless privacy is designed into the platform, they can leak just like a public post.</li>
<li>
<p><strong>Sensitive data at risk</strong><span> </span>– Health details, credentials, and personal secrets were all exposed, showing how valuable this information is.</p>
</li>
<li>
<p><strong>Think before you share</strong><span> </span>– Treat AI chats like social media and never share anything you would not want to end up online.</p>
</li>
</ul>






















<h2>Fake Mac fixes trick users into installing new Shamos infostealer</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNjc4OTQ1NDEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI5MTBhMTBmNjJhZjNjZGIxIn0" target="_blank" rel="noopener">https://youtu.be/v64EH9pK_w8?t=267</a></p>
<p>A new malware strain called Shamos is targeting Mac users by posing as a system fix. Attackers are using malvertising and fake websites like<span> </span><a href="http://mac-safer.com/" target="_blank" rel="noopener">mac-safer.com</a><span> </span>to trick people into pasting commands into Terminal. Instead of solving a problem, the code installs an infostealer that grabs browser data, passwords, Keychain items, Apple Notes, and even crypto wallets. Since June more than 300 Mac environments have been hit.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyNzUyMzQ1NzQsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJmMDEwZWY0ZDhmYTllN2UwIn0" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/fake-mac-fixes-trick-users-into-installing-new-shamos-infostealer/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Looks helpful, ends harmful</strong><span> </span>– Fake fixes prey on people desperate to solve a problem quickly.</li>
<li>
<p><strong>High-value data stolen</strong><span> </span>– Shamos can access passwords, notes, and financial accounts, making it highly damaging.</p>
</li>
<li>
<p><strong>Safe support routes</strong><span> </span>– Never run commands from random sites. Always go directly to Apple’s official support channels.</p>
</li>
</ul>






















<h2>Dev gets 4 years for creating kill switch on ex-employer’s systems</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyODI1NzQ2MDgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhYmZmMTMzZGJlMGUwNTAzIn0" target="_blank" rel="noopener">https://youtu.be/v64EH9pK_w8?t=548</a></p>
<p>Former software developer Davis Lu was sentenced to four years in prison after sabotaging his ex-employer’s network. Lu had secretly embedded malicious code into Eaton Corporation’s systems that triggered when his account was disabled. The “kill switch” crashed servers, deleted profiles, and locked out thousands of users, costing the company hundreds of thousands of dollars.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyODk5MTQ2NDEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJiYzY0Y2RmZGExYWIzMTYwIn0" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/dev-gets-4-years-for-creating-kill-switch-on-ex-employers-systems/</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Insider risk is real</strong><span> </span>– While most insider incidents are accidental, malicious acts can cause devastating damage.</li>
<li>
<p><strong>Planned sabotage</strong><span> </span>– Lu named his code after himself, showing how brazen and deliberate insider threats can be.</p>
</li>
<li>
<p><strong>Controls matter</strong><span> </span>– Monitoring for unusual code, enforcing separation of duties, and regular audits can reduce this risk.</p>
</li>
</ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>This Week's Discussion Points...<strong></strong>
</h2>
<p>Hundreds of thousands of Grok chats exposed in Google results<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUyOTcyNTQ2NzQsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhOWIwZjYxMzM0NjE5MjEzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMDQ1OTQ3MDgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIwMTQwYzNkYjNmNzU4MGMxIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Fake Mac fixes trick users into installing new Shamos infostealer<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMTE5MzQ3NDEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJiNTY1ODVlN2I3OGE5MGEyIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMTcxNzc2MjUsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI1YThmMzg2MmE4ODNhMzk4In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Dev gets 4 years for creating kill switch on ex-employer's systems<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMjQ1MTc2NTksXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJlOWZkZGU2OWZjZmU1YjgzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMjk3NjA1NDEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhNTM3YzYxNzc4ODIwYTJjIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Orange Belgium discloses data breach impacting 850,000 customers<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzMzUwMDM0MjMsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJjN2FmYzBhNWM5Zjc4OTRhIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNDAyNDYzMDUsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJmMmI5MTA4NTVjNTM3NTFmIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>You Won’t Be Able to Install Apps from Unverified Android Developers Soon<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNDY1Mzc3NjMsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI3YzdkYWQ0NTAwZjE0MDY0In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNTM4Nzc3OTcsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI3NjhmZWQzNzE2ZTcyMDEwIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>4chan launches legal case against Ofcom in US federal court<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNTkxMjA2ODAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhN2JkNTA4ZjAzZTU1MTM3In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNjU0MTIxMzgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJmNmVmMGRkMzAwZTc2YmNmIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>How 16 billion becomes 231 million, then 9 million<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNzA2NTUwMjEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIxOTc3ZjMwNmYwNmIxODI0In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTUzNzU4OTc5MDMsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI4MzJiYzM0MDM4OGYzMzk3In0" target="_blank" rel="noopener">Read</a></strong></p>
<p>MoD staff warned not to share hidden data before Afghan leak<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0MTI1OTgwNzYsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI0NDQ2OTJkZTIyMjJjODgwIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0MTk5MzgxMTIsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI3MDM0NzU5NDk5NTQ1NGRkIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Denmark’s bold move to protect citizens from deepfakes<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0MjcyNzgxNDcsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhYzc3YzFlOGU3ZjlkZGEzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0MzU2NjY3NTksXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIzNzIwZGFkMDU2OWI0MDJiIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Why are hackers always shown in hoodies?<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0NDMwMDY3OTUsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIxYmFiYzViYTlmNmVjZjkwIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0NTI0NDM5ODQsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJiN2ViZTUwOTdlNzBjNjkzIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>WiFi signals reveal human movement indoors<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0NjE4ODExNzAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIzZDdhOTgwNjBjODUzMDIzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0NzM0MTU1MDgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI1ODk4YWM2MjQ4YmFmYTVmIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p>Gmail unsubscribe hack<br><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0Nzg2NTgzOTAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiIwYWYxYmU4NTcxZmM3MDA4In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0ODQ5NDk4NTAsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJiMmIyOWI0ZWM4MDI3MWEyIn0" target="_blank" rel="noopener">Read</a></strong><br><br></p>
<p><strong><span> </span>Subscribe to the Newsletter</strong></p>
<p><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0OTEyNDEzMDgsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhYjBlYTM3M2JiOWU5MDBiIn0" target="_blank" rel="noopener">https://www.riskycreative.com</a><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU0OTc1MzI3NjYsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJmZmI1MGI1Yzc5YzllNTc4In0" target="_blank" rel="noopener"></a></p>
<ul></ul>






















<h2>The Gmail unsubscribe hack you might not know about</h2>
<p>Watch - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU1MDM4MjQyMjMsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiI5ZjM2MzVmMzI5YWExZmJhIn0" target="_blank" rel="noopener">https://youtu.be/v64EH9pK_w8?t=2418</a><a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU1MTAxMTU2ODEsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJhYjU1NzNjMzc4NTFjZDA5In0" target="_blank" rel="noopener"></a></p>






















<span><img class="m_6615620331083099690img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NYp22YO9PtHkMaYVCqrMfcA-45yz7npYeCtz4DLq_FVWK56yFaPnOQUYFXVYsqL8Xght28gkQktf0QMT2SZa9XzQtxGL6rPJ006ocQywUBSbJ3ZMrExvbDGyM1fY1jop7x1cxqBLyHM7855sCAacLYd=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/b5mqJ6HYUytrF9fCXbnxTDKLmPv8YIoJxSOI3uaz.png" width="540" onerror="this.style.display='none'"></span>

























<p>A TikTok clip revealed a simple Gmail trick to clear out unwanted emails. In the left-hand menu under “More,” there’s a<span> </span><strong>Manage Subscriptions</strong><span> </span>option. It lists every newsletter and marketing email you’re signed up to, with a one-click unsubscribe button. It even shows how often you receive them, making it much easier to tidy your inbox.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Hidden feature</strong><span> </span>– Gmail has a built-in tool to manage and cancel subscriptions in bulk.</li>
<li>
<p><strong>Time saver</strong><span> </span>– Instead of hunting through emails, you can unsubscribe directly in one place.</p>
</li>
<li>
<p><strong>Inbox hygiene</strong><span> </span>– Keeping clutter under control reduces the risk of missing important security messages.</p>
</li>
</ul>
 
<p>Watch it at - <a href="https://dzxlpg.clicks.mlsend.com/td/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjQzMTQ4NTU1MTc0NTU3MTUsXCJyXCI6MTY0MzE0OTAxODQ2Njg5MjA5fSIsInMiOiJiODNiODVkY2U5NjdlMTcyIn0" target="_blank" rel="noopener">https://vm.tiktok.com/ZNd4NNg1V/</a></p>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>











</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/156603?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/156603?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F156603%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F156603%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_154454">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/154454/watch_times"
  data-youtube-player-video-id-value="Vcol4c93Eg8"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/xtiuqvratung1dihqigr104laxe6" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/154454">
          Aug 24, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/154454">
            Your VPN Extension Might Be Watching You Right Now!
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<h1>Your VPN Extension Might Be Watching You Right Now!</h1>
<p>This week’s episode is packed with cyber scams, shady extensions, and even hackers opening floodgates at a dam in Norway. We’re talking about how censorship laws could reshape the internet, the UK quietly backing down in its Apple privacy fight, and a new infostealer campaign disguised as copyright warnings. Add in PayPal credential dumps, Workday’s social engineering breach, and Chrome extensions spying on users, and there’s plenty to dive into. Plus, we take a look at the latest SANS 2025 Security Awareness Report and what it means for awareness teams everywhere.</p>
<p>🎧 Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="150" src="https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="48" src="https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>





























<h2>Fake Copyright Emails Delivering Malware</h2>
<p>Watch the discussion - <a href="https://youtu.be/Vcol4c93Eg8?t=670" target="_blank" rel="noopener">https://youtu.be/Vcol4c93Eg8?t=670</a></p>
<p>Attackers are sending out spear-phishing emails that pretend to be legal threats from law firms over copyright or IP infringement. The emails look convincing, mentioning details like Facebook page IDs or company names, and urge recipients to download a file. That “PDF” is actually a disguised archive carrying the<span> </span><em>Noodlophile</em><span> </span>infostealer, which steals cookies, saved cards, and login credentials while hiding on the system.</p>
<p>Read more - <a href="https://www.helpnetsecurity.com/2025/08/18/noodlophile-infostealer-spear-phishing-campaign-copyright-infingement/" target="_blank" rel="noopener">https://www.helpnetsecurity.com/2025/08/18/noodlophile-infostealer-spear-phishing-campaign-copyright-infingement/</a></p>
<p><strong>∠T</strong><strong>he Awareness Angle</strong></p>
<ul>
<li>
<strong>Fear as a Trigger</strong><span> </span>– Legal threats create panic, pushing people to click quickly without questioning.</li>
<li>
<p><strong>Malware Masquerade</strong><span> </span>– The file looks like a PDF but is really an installer that sideloads malware into trusted apps.</p>
</li>
<li>
<p><strong>Expanding Threat</strong><span> </span>– This isn’t just hitting small creators anymore, it’s now targeting businesses worldwide.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<h2>Workday Breach via Social Engineering</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Vcol4c93Eg8?t=1251" target="_blank" rel="noopener">https://youtu.be/Vcol4c93Eg8?t=1251</a></p>
<p>Workday, the HR and enterprise software provider, disclosed a breach after attackers posed as HR or IT staff over phone and text to trick employees into handing over credentials. The attackers accessed a connected CRM platform, exposing business contact details like names, emails, and phone numbers. While no sensitive HR or financial data was taken, those details can be weaponised in phishing and social engineering campaigns.</p>
<p>Read more - <span><a href="https://securityaffairs.com/181271/data-breach/human-resources-firm-workday-disclosed-a-data-breach.html" target="_blank" rel="noopener">https://securityaffairs.com/181271/data-breach/human-resources-firm-workday-disclosed-a-data-breach.html</a></span></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Social Engineering Wins</strong><span> </span>– A simple call or text can bypass strong technical controls if trust isn’t questioned.</li>
<li>
<p><strong>Small Data, Big Risk</strong><span> </span>– Even “just” names and emails can fuel convincing phishing or extortion attempts.</p>
</li>
<li>
<p><strong>Third-Party Weakness</strong><span> </span>– Breach came through a connected CRM, highlighting supply chain and SaaS risks.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<h2>PayPal Credentials for Sale</h2>
<p>Watch the discussion -<span> </span><span class="ml-rte-link-wrapper"><a href="https://youtu.be/Vcol4c93Eg8?t=1250" target="_blank" rel="noopener">https://youtu.be/Vcol4c93Eg8?t=1250</a></span></p>
<p>A cybercriminal claims to be selling 15.8 million PayPal logins in plain text for just $750. While researchers say it’s unlikely PayPal itself was breached, the data probably comes from infostealer malware logs that harvested credentials from infected devices. Even if many accounts are fake or outdated, the inclusion of PayPal login URLs makes it easier for attackers to launch automated credential stuffing and fraud attempts.</p>
<p>Read more - <span class="ml-rte-link-wrapper"><a href="https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/" target="_blank" rel="noopener">https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/</a></span></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Not a PayPal Breach</strong><span> </span>– The danger comes from malware stealing credentials on personal devices, not PayPal’s systems.</li>
<li>
<p><strong>Password Reuse Problem</strong><span> </span>– Recycled passwords could expose accounts on other services, not just PayPal.</p>
</li>
<li>
<p><strong>MFA is Essential</strong><span> </span>– Multi-factor authentication remains the best defence if passwords are compromised.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>






















<h2>Pro-Russian Hackers Breach Norwegian Dam</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/Vcol4c93Eg8?t=1929" target="_blank" rel="noopener">https://youtu.be/Vcol4c93Eg8?t=1929</a></p>
<p>Norway’s Police Security Service confirmed that pro-Russian hackers briefly seized control of a hydropower dam earlier this year. Attackers remotely opened floodgates, releasing 500 litres of water per second for four hours before being stopped. No damage occurred, but the hackers later posted video proof of the breach on Telegram to amplify fear. The attack highlights how critical infrastructure can be manipulated as part of hybrid influence campaigns rather than outright destruction.</p>
<p>Read more - <a href="https://securityaffairs.com/181143/hacktivism/norway-confirms-dam-intrusion-by-pro-russian-hackers.html" target="_blank" rel="noopener">https://securityaffairs.com/181143/hacktivism/norway-confirms-dam-intrusion-by-pro-russian-hackers.html</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Not a PayPal Breach</strong><span> </span>– The danger comes from malware stealing credentials on personal devices, not PayPal’s systems.</li>
<li>
<p><strong>Password Reuse Problem</strong><span> </span>– Recycled passwords could expose accounts on other services, not just PayPal.</p>
</li>
<li>
<p><strong>MFA is Essential</strong><span> </span>– Multi-factor authentication remains the best defence if passwords are compromised.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>This Week's Discussion Points...</h2>
<p><strong>Censorship is going to destroy the internet</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=231" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://mashable.com/article/age-verification-is-going-to-destroy-the-entire-internet" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>UK backs down in Apple privacy row</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=446" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bbc.co.uk/news/articles/cdj2m3rrk74o" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Noodlophile infostealer behind fake copyright notices</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=639" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.helpnetsecurity.com/2025/08/18/noodlophile-infostealer-spear-phishing-campaign-copyright-infingement/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>15.8M PayPal credentials for sale</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=1247" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Workday data breach via social engineering</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=1447" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://securityaffairs.com/181271/data-breach/human-resources-firm-workday-disclosed-a-data-breach.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Android–iPhone messaging security upgrade</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=1589" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.androidauthority.com/apple-ios-26-rcs-end-to-end-encryption-mls-protocol-3588258/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Norway dam intrusion by pro-Russian hackers</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=1928" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://securityaffairs.com/181143/hacktivism/norway-confirms-dam-intrusion-by-pro-russian-hackers.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Chrome VPN extension spying on users</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=2168" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://cyberinsider.com/chrome-vpn-extension-with-100k-installs-screenshots-all-sites-users-visit/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Google patches critical Chrome flaw</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=2350" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://cyberpress.org/google-patches-high-severity-chrome-vulnerability-allowing-code-execution/?amp=1" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>SANS 2025 Security Awareness Report</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=2480" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.sans.org/mlp/ssa-security-awareness-report" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>NowTV anti-piracy ad</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=3114" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.reddit.com/u/NOWTV/s/w25iEaEagE" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Chipotle phishing simulation backlash</strong><br><a href="https://youtu.be/Vcol4c93Eg8?t=3314" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.instagram.com/reel/DNd3fDrxBGG/?igsh=MWt1ZWN1MHdreTUxaQ==" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p></p>
<p><strong>📬 Subscribe to the Newsletter</strong></p>
<p></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>
<p><a href="https://www.instagram.com/reel/DH6DhqNorAj/?igsh=cm54OHh0dXVkMTh1" target="_blank" rel="noopener"></a></p>






















<h2>Free Chipotle? It’s a Phish</h2>
<p>Watch - <a href="https://youtu.be/Vcol4c93Eg8?t=3296" target="_blank" rel="noopener">https://youtu.be/Vcol4c93Eg8?t=3296</a><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<span><img class="img" alt="" src="https://storage.mlcdn.com/account_image/769696/ubWaWkiphfQATC2jNH5bWwTS4faTIRHjsK2q6sz3.png" width="540" onerror="this.style.display='none'"></span>

























<p>A viral Instagram video shows an employee falling for a simulated phishing email offering free Chipotle. She clicked the link, filled in her order, and turned up at work expecting lunch — only to discover it was a test. Instead of burritos, she got three hours of mandatory phishing training. While it makes for a funny video, it raises serious questions about how organisations run phishing campaigns. Humiliating staff and punishing them harshly for one mistake can backfire, creating resentment instead of awareness.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Humour or Harm?</strong><span> </span>– Funny to watch, but heavy-handed training risks damaging trust with employees.</li>
<li>
<p><strong>Punishment vs Learning</strong><span> </span>– Phishing simulations should build awareness, not embarrass staff.</p>
</li>
<li>
<p><strong>Better Approaches</strong><span> </span>– Supportive feedback, coaching, and bite-sized training are more effective than punitive measures.</p>
</li>
</ul>
<p>Watch it at - <a href="https://www.instagram.com/p/DNkKhYssbRW/" target="_blank" rel="noopener">https://www.instagram.com/p/DNkKhYssbRW/</a></p>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>


























<h2>Next podcast episode...</h2>

























<span><img src="https://static.mailerlite.com/cbuilder/timer/2025-09-01%2006%3A00%3A00/light/Europe%2FLondon" width="354" onerror="this.style.display='none'"></span>











Days









Hours









Minutes









Seconds






















</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/154454?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/154454?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F154454%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F154454%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_153566">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/153566/watch_times"
  data-youtube-player-video-id-value="Ce8cjxsYXDY"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/87xzwrufiw7nwafpuo7kq08xte03" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/153566">
          Aug 18, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/153566">
            Could Your Webcam Be Spying on You?
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week, we’re bringing you a mix of Chicago heat, cyber scares, and a bit of nostalgia. I’ve just wrapped up an incredible few days at the SANS Security Awareness Summit, where 350 awareness pros (and over 5,000 virtually) came together to share stories, strategies, and yes, a few laughs. From romance scam keynotes to Champions Network chats, it was packed. You can catch our two live streams (plus a brilliant bonus bit) from the summit on YouTube if you missed them.</p>
<p>Back in the news, we dig into a wild Lenovo webcam flaw that turns cameras into hacking tools, a scam piggybacking on car finance compensation, and fresh zero-days cracking open password vaults. Plus, there’s a telecom breach, a city hit with ransomware has breached data made available, and a reminder that even “strong” passwords aren’t always as strong as we think.</p>
<p>And because we like to balance the serious with the fun, we also talk AOL dial-up (RIP after 30 years), calendar spam scams, and the rise of “Major Data Breach” as a military rank.</p>
<p><span><img class="an1" alt="🎧" src="https://fonts.gstatic.com/s/e/notoemoji/16.0/1f3a7/32.png" onerror="this.style.display='none'"></span><span> </span>Listen on your favourite podcast platform - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5NzQ1NTk2OTAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI3M2NhNjZhZWU4MDQxMWIzIn0" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5Nzg3NTM5OTYsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIwMzdmYWIyNzk2MzkzYmIxIn0" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5ODM5OTY4NzksXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJlNGY5ZjAxNzA5ODY4NDQ5In0" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5ODkyMzk3NjEsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIzMzMwNTNhOTNkMGQ3Mjg5In0" target="_blank" rel="noopener"><span><img class="m_8967029074684832580img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5OTM0MzQwNzAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIxZDcxMjQxNDMwNTc5Zjk4In0" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjc5OTk3MjU1MzAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI1NjFkZGNlZDQzMDYwYTE2In0" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMDM5MTk4MzgsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI4NjFlODYzYjFlZGQ1MWIzIn0" target="_blank" rel="noopener"><span><img class="m_8967029074684832580img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>





























<h2>Conversations From The Summit</h2>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMDkxNjI3MjMsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJmMmMzYjUyM2I0ZGE4MzZlIn0" target="_blank" rel="noopener"></a></p>






















<span><img class="m_8967029074684832580img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NapIYV1UrmMNb9xlevh0MO3ooGaRk860wTz6BWn9B60LLD31pHj0RzVIVsJBZD8Gr5GvmPU3gzk3Z_WiTenDuZAlsImANqo44GTUQUP2N35_U41cXnnoNuonaL7bbfewlPKy_3meI1gH_ukhYkEhd7x=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/FRlWeaWx4Fwr4nOG4g10oRwTQi8r9495GuYLSIqN.png" width="540" onerror="this.style.display='none'"></span>






















<p>The SANS Security Awareness Summit is the biggest gathering of people who live and breathe security awareness, human risk, and culture. This year, more than 350 professionals met in Chicago, with thousands more joining online. For two days the focus was on one thing: how to make security stick with people.</p>
<p>Here are some of the big takeaways from the conversations and sessions:</p>
<ul>
<li>
<p><strong>Stories make it stick</strong><span> </span>– time and again, people highlighted that storytelling is one of the most powerful tools we have in awareness. A good story is remembered years later, while a policy or slide deck is often forgotten.</p>
</li>
<li>
<p><strong>Words matter</strong><span> </span>– the language we use can either build trust or shut people down. Some traditional buzzwords are starting to feel stale or even negative, and many are turning towards warmer, more human messaging.</p>
</li>
<li>
<p><strong>Culture over compliance</strong><span> </span>– the strongest programs are moving away from box-ticking exercises and instead building genuine relationships across the business. It’s about nurturing behaviours, not policing them.</p>
</li>
<li>
<p><strong>Champions need investment</strong><span> </span>– security champions and ambassador networks are widely seen as one of the best ways to influence culture, but they only thrive when they have proper support, budget, and dedicated people running them.</p>
</li>
<li>
<p><strong>Community is everything</strong><span> </span>– awareness professionals are learning as much from each other as they are from the talks. Peer-to-peer sharing, whether at the summit or in ongoing practice groups, is driving new ideas and confidence.</p>
</li>
<li>
<p><strong>Human risk is front and centre</strong><span> </span>– the conversation is shifting from “awareness training” to measuring and reducing actual behaviours that create risk, supported by better data and behavioural science.</p>
</li>
<li>
<p><strong>The power of in-person</strong><span> </span>– many said the real magic of the summit is in the connections: the chats over coffee, the sense of community, and the reassurance that you’re not the only one facing these challenges.</p>
</li>
</ul>
<span>You can watch both LinkedIn Lives and a bonus session on YouTube.<br></span>
<p><span>Watch here - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMTQ0MDU2MDgsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI0MDg4Mzg5ZDlhODE4NDI5In0" target="_blank" rel="noopener">https://www.youtube.com/playlist?list=PLEsOj51Q0PfBp55nkDIS0S3sA8cTJFJkk</a></span></p>



























































<h2>Lenovo Webcams Can Be Turned Into BadUSB Devices</h2>
<p>Watch the discussion - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMjE3NDU2NDUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI4ZmM3MWJlZDAwOTNmMzliIn0" target="_blank" rel="noopener">https://youtu.be/Ce8cjxsYXDY?t=527</a></p>
<p>Researchers have found a serious flaw in certain Lenovo webcams (CVE-2025-4371) that allows attackers to remotely reprogram them into so-called<span> </span><em>BadUSB</em><span> </span>devices. Originally demonstrated back in 2014, this attack takes advantage of USB firmware itself, turning what looks like an innocent webcam into a malicious tool. Once compromised, the camera can inject keystrokes, deliver payloads, or log data.  What's even more worrying is that it can survive a full operating system reinstall.</p>
<p>Lenovo has released firmware updates to fix the issue, but it’s a reminder that even everyday accessories like webcams aren’t always as simple as they seem. These devices often run their own operating systems and can be weaponised without the user ever realising.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMjY5ODg1MjgsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIxYjUyYzY1MGQyOGZmZjNlIn0" target="_blank" rel="noopener">https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html</a></p>
<p><strong>∠T</strong><strong>he Awareness Angle</strong></p>
<ul>
<li>
<strong>Peripheral Trust Risks</strong><span> </span>– Even “innocent” devices like webcams can run their own OS and be remotely weaponised.</li>
<li>
<p><strong>Persistence Beyond OS Wipe</strong><span> </span>– Firmware-level malware survives reinstallation, requiring hardware-level fixes.</p>
</li>
<li>
<p><strong>Supply Chain &amp; Physical Access Threats</strong><span> </span>– Malicious devices could be shipped to targets or swapped in by insiders.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMzMyNzk5ODksXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIwMWE3NTY1YTQ4NzM4MzkxIn0" target="_blank" rel="noopener"></a></p>






















<h2>uBlock Origin Lite Finally Comes to Safari</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwMzg1MjI4NzUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI2NDBjYmIwOTUzNTEwZDcxIn0" target="_blank" rel="noopener">https://youtu.be/Ce8cjxsYXDY?t=763</a></p>
<p>Safari users have been missing a reliable ad blocker for years, but that gap is now filled. uBlock Origin Lite is a lightweight, privacy-friendly version of the popular ad blocker and is finally available on macOS, iOS, and iPadOS. Unlike the original extension, it uses Safari’s “declarative rules API,” which means the browser handles all the blocking natively, without draining CPU or memory.</p>
<p>Why does this matter? Malicious Advertising (or Malvertising) is still a common infection route, and a good ad blocker doesn’t just clean up your browsing experience. It also helps protect against malicious ads. For Apple users who’ve been stuck without proper options, this is a welcome (and safer) addition.</p>
<p>Read more - <span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNDQ4MTQzMzUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIyZWRmNDQ0ZDExMWNiYTI4In0" target="_blank" rel="noopener">https://www.howtogeek.com/ublock-origin-lite-is-finally-available-on-safari/</a></span></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Lightweight Privacy Tool</strong><span> </span>– Blocks ads and trackers without draining device resources.</li>
<li>
<p><strong>Apple Ecosystem Gap Filled</strong><span> </span>– Safari users on iPhone and iPad finally get official support.</p>
</li>
<li>
<p><strong>Declarative Security Model</strong><span> </span>– Reduces attack surface by letting the browser handle blocking logic natively.</p>
</li>
</ul>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNTAwNTYxOTUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI2OGUxNTA5MmYxYTU0MzU4In0" target="_blank" rel="noopener"></a></p>






















<h2>Scammers Jump on Fake Car Finance Payouts</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNTYzNDc2NTYsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJmNGVlOTI1MGIzY2E2OTlhIn0" target="_blank" rel="noopener">https://youtu.be/Ce8cjxsYXDY?t=963</a></p>
<p>The UK’s Financial Conduct Authority (FCA) has warned motorists about scam calls offering fake compensation for mis-sold car finance deals. Real compensation of up to £950 per driver is being considered, but the scheme isn’t live yet. Fraudsters are exploiting the publicity by posing as lenders and tricking people into handing over personal and banking details.</p>
<p>The FCA has been clear: it will<span> </span><em>never</em><span> </span>ask for PINs or passwords. If someone calls about a payout, it’s a scam. Hang up immediately and report it. With so much publicity around the genuine legal cases, these scams are only likely to grow.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNjI2MzkxMTUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIyNjcwODgyM2M3MDY1ZTg2In0" target="_blank" rel="noopener">https://www.bbc.co.uk/news/articles/c860021w3g8o</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>No Scheme Yet</strong><span> </span>– Any compensation offers right now are fake as the FCA is still in consultation.</li>
<li>
<p><strong>Data Theft Risk</strong><span> </span>– Scammers aim to harvest bank and personal details under the guise of claims.</p>
</li>
<li>
<p><strong>Avoid Middlemen</strong><span> </span>– Claims firms may take up to 30% of payouts unnecessarily.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNjc4ODE5OTgsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI2YzQ0NTBkZjQ5Yzg4ODA1In0" target="_blank" rel="noopener"></a></p>






















<h2>Google Calendar Spam Invites Trick Users Into Scams</h2>
<p>Watch the discussion -<span> </span><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNzMxMjQ4ODIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJhOTM3ZjlhYWE0OGE0YThmIn0" target="_blank" rel="noopener">https://youtu.be/Ce8cjxsYXDY?t=2531</a></p>
<p>A sneaky scam is making its way into people’s schedules, literally. Attackers are sending fake Google Calendar invites that look like business opportunities, complete with WhatsApp numbers and vague “partnership” offers. Because Calendar is often set to automatically add invitations, these bogus meetings appear right in your diary even if the invite goes to spam.</p>
<p>The hook is simple: reply to the WhatsApp number and they’ll try to extract personal details, bank info, or upfront payments for a fake deal. Several versions are circulating, all using different email addresses but the same WhatsApp contact.</p>
<p>The fix is straightforward:</p>
<ul>
<li>
<p>In Google Calendar, go to<span> </span><strong>Settings → Event settings → Automatically add invitations → No, only show invitations I’ve responded to.</strong></p>
</li>
<li>
<p>Under<span> </span><strong>View options</strong>, uncheck<span> </span><strong>Show declined events</strong>.</p>
</li>
</ul>
<p>This is basically phishing delivered through your calendar instead of your inbox, and it’s a reminder that spam can slip in from unexpected places.</p>
<p>Read more - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwNzk0MTYzNDAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJiZmZkM2ZkMGIxYzdkMzEyIn0" target="_blank" rel="noopener">https://www.bitdefender.com/en-gb/blog/hotforsecurity/use-google-calendar-heres-the-one-change-that-can-protect-your-business-from-scams</a></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Calendar Phishing</strong><span> </span>– Scams don’t just arrive by email anymore; invites and reminders can be weaponised too.</li>
<li>
<p><strong>Default Settings Risk</strong><span> </span>– “Automatically add” gives attackers a free pass to your schedule.</p>
</li>
<li>
<p><strong>Simple Fix</strong><span> </span>– Changing one setting shuts down this entire attack vector.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwODQ2NTkyMjEsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJjNTk3NmVkNjY4MGI3MmQ5In0" target="_blank" rel="noopener"></a></p>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>This Week's Discussion Points...</h2>
<p><strong>Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwODk5MDIxMDIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIwMjFkMDAzOGUyODk5ODg0In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgwOTQwOTY0MDcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJiOGMxZGI1NzI5MDE2ZDdlIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>uBlock Origin Lite Is Finally Available on Safari</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMDU2MzA3NDQsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI4ODUyYjBiMjFlODdkZmY2In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMTA4NzM2MjUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJmMzQ0YTlhYjIxMWVhNTUxIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Drivers warned about scam car finance payout calls</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMTUwNjc5MzAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJhNWZhYjE2NDMzMDI1Mzk4In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMjEzNTkzODcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIwYzUwYTg1MzcwMTZkYzc1In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Critical Zero-Days Crack Open CyberArk Password Vaults</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMjU1NTM2OTIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI3NzM2NTgyNmUyYWVlZDc3In0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMjk3NDc5OTcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJlODQyYmFlMjJkN2YzZjBhIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxMzQ5OTA4NzgsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJhNTBiYThiZmQzOGMwZWFmIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNDEyODIzMzUsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIwYmQ1NjVmODBiMjE1ZGY3In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Interlock Ransomware Group Leaks 43GB of Data in City of St. Paul Cyberattack</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNDY1MjUyMTYsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJhZTFjYWUzMmY4NmU5NDBjIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNTA3MTk1MjEsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIyZTYzYzM3MWVjNGI1MGVjIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Reddit: Strong Passwords Weaker Than Weak Ones</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNTU5NjI0MDIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJlMjViYmQxZTU0NmIwNmEyIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNjAxNTY3MDcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJmN2JjODY1MWM1ZTQwYzQ5In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Reddit Meme: Age Verification Scam Ads</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNjQzNTEwMTIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIxNjFhNTNiNDU2MmMyY2NhIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNjg1NDUzMTcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJlZTBjMWZhODY3MjNiNzc0In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Password Power – CyberHerd Awareness Game</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNzI3Mzk2MjIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI1ZDc3MGFmYWU5NmM2ZjVlIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxNzY5MzM5MjcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJmYTU2ZDI3ZmRhMDczYWFmIn0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>AOL Ends Dial-Up Service After More Than 30 Years</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxODAwNzk2NTYsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI2NzZiZjk2NGU3MDNjYmIyIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxODYzNzExMTMsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI4MjlkZTAzNmE5MmJjYTk4In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Major Data Breach Meme (Major Data Breach Reporting for Duty)</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxODk1MTY4NDIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI5ZWExZDQ0ZjQ2ZDEzZTUzIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxOTM3MTExNDcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIyZmIzMWQ3YjU1NzQ4YjM3In0" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Google Calendar Spam Scam</strong><br><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgxOTc5MDU0NTIsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJiY2E4NTI5MTFiOGZlOTIxIn0" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMDIwOTk3NTcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJiYWVhNzI3OThmNGRhYzI1In0" target="_blank" rel="noopener">Read</a></strong><br><br></p>
<p><strong><span><img class="an1" alt="📬" src="https://fonts.gstatic.com/s/e/notoemoji/16.0/1f4ec/32.png" onerror="this.style.display='none'"></span><span> </span>Subscribe to the Newsletter</strong></p>
<p></p>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMDYyOTQwNjMsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJiMTNhNTAxOTM4Mjc0MWFmIn0" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMTI1ODU1MjAsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiJhMDMzMWQ0ZjVhZWY1MjhmIn0" target="_blank" rel="noopener"></a></p>






















<h2>Major Data Breach… Reporting for Duty</h2>
<p>Watch - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMTc4Mjg0MDEsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI5OTg1ZWZiOTU3ZTVlMThkIn0" target="_blank" rel="noopener">https://youtu.be/Ce8cjxsYXDY?t=2361</a></p>
<p><a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMjIwMjI3MDYsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiI5MjY2NmI3ZjE4MDNjMGE2In0" target="_blank" rel="noopener"></a></p>






















<span><img class="m_8967029074684832580img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NbnzBtR78GZxhyd1JaNhh_yvb7u2D9UpwrCqWfbMeDbQULm0rP1nbKTKqUt74lWasbGdV-x75oUFcCXbMx9_NfxZ8y9Z2rA0J_dGmmrU2udD_c8Fk7z4gFoUSVBAVDk7UoiCyvjqXGZ6bpKTQB60NzR=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/cKvfpqacc1j9pEb6Xct3E6VBdaxA3rDGOSJISVtd.png" width="540" onerror="this.style.display='none'"></span>

























<p>Sometimes security awareness doesn’t need a 50-page whitepaper, it just needs a good laugh. On an Australian news broadcast, the words<span> </span><em>“Major Data Breach”</em><span> </span>flashed up on screen while a military officer in uniform stood perfectly in frame. The unintentional mash-up looked like the officer’s name badge was literally “Major Data Breach.”</p>
<p>The clip from the Toni and Jon Podcast last year has since gone viral and for good reason. It’s a reminder that humour can break down barriers when talking about cyber. Sharing memes, light-hearted clips, and cultural moments like this in your workplace can spark conversations that stick far longer than another all-staff email.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Humour Works</strong><span> </span>– A funny clip can start the security conversation better than another warning.</li>
<li>
<p><strong>Front of Mind</strong><span> </span>– Little viral moments keep “cyber” relevant in everyday chatter.</p>
</li>
<li>
<p><strong>Relatable Training Tool</strong><span> </span>– Sharing memes in newsletters, chats, or town halls can make security feel human and approachable.</p>
</li>
</ul>
<br>
<p>Watch it at - <a href="https://dzxlpg.clicks.mlsend.com/tb/cl/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNjMwNjEyMjgyMjcyNjU1ODcsXCJyXCI6MTYzMDYxMjM5MzUyNjU3NjgwfSIsInMiOiIxZmRiN2RjMjY0MTgyYjhkIn0" target="_blank" rel="noopener">https://www.instagram.com/reel/DNPuMmOsQC0/?igsh=MTZpNmViaW8xNGl3</a></p>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/153566?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/153566?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F153566%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F153566%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_149256">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/149256/watch_times"
  data-youtube-player-video-id-value="c9CzNOszjxI"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://storage.googleapis.com/popshopprod-membership-assets-single-b5px4371/iwvb26ahoycyj4alyufus322n0hz" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/149256">
          Aug 11, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/149256">
            Microsoft Recall Is Still Saving Your Passwords?
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p>This week on The Awareness Angle, we’re digging into the UK’s Online Safety Act again, but this time looking at the hidden privacy risks of handing your most sensitive data to unregulated overseas firms. From facial scans to passport details, we ask whether the cure is worse than the disease.</p>
<p>We also unpack Microsoft Recall’s ongoing privacy failings, with tests still showing it can capture credit cards, passwords and other sensitive details, even with filters supposedly in place. And in Canada, the City of Hamilton’s $5M cyber insurance claim has been denied after skipping a basic security control, multi-factor authentication.</p>
<p>Elsewhere, scammers are faking endorsements with AI, the UK's Liberal Democrats want tighter vetting of YouTube ads, Google joins the list of Salesforce breach victims, and Pandora confirms a third-party attack. Plus, a staggering 6.8 million WhatsApp scam accounts taken down, and the strange world of North Korea’s undercover IT workforce.</p>
<p>And finally, Ant is getting ready for two LinkedIn Lives from the SANS Security Awareness Summit in Chicago, so if you can’t be there, you can still soak up the atmosphere from wherever you are.</p>
<p><strong>New Website Now Live!</strong></p>
<p>This week saw us launch our new website.  It's now easier than ever to view past episodes. You can also now sign up to become a member and buy Awareness Angle merchandise.  We've got new items coming to the store in the coming weeks, so keep your eyes peeled.  Check out the site at<span> </span><span class="ml-rte-link-wrapper"><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">riskycreative.com</a></span></p>
<p>🎧 Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="150" src="https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="48" src="https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>





























<h2>SANS Security Awareness Summit - A Different Remote Experience</h2>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<span><img class="img" alt="" src="https://storage.mlcdn.com/account_image/769696/DXUHmqQQaUoo70vv8FByGXMox1NXGQGW4k7IQYfl.jpg" width="540" onerror="this.style.display='none'"></span>






















<p><span class="ml-rte-link-wrapper"><a href="https://riskycreative.com/podcast/aj_king_on_phishing_present_bias_and_purple_cows" target="_blank" rel="noopener"></a></span><strong>🎙️ Live From Chicago...</strong></p>
<p>This week, Ant will be bringing the energy of the SANS Security Awareness Summit straight to you with two live LinkedIn broadcasts direct from the community area in Chicago.</p>
<p>On<span> </span><strong>Thursday, 14th August</strong><span> </span>and<span> </span><strong>Friday, 15th August</strong><span> </span>(12:15–13:30 Chicago time, 18:15–19:30 UK), he'll be chatting with awareness professionals, vendors and other attendees to capture the buzz of the summit. You can already watch the official talks online, but these lunchtime lives will give you the conversations, atmosphere and insights from the floor, including the bits you don’t usually see.</p>
<p>It’s a chance to meet some of the people driving change in the awareness space, hear what’s hot in the industry right now and maybe even spot some of our new podcast merchandise making their debut.</p>
<p><strong>Register for the live streams below:</strong></p>
<p><strong>Thursday's Event - <span class="ml-rte-link-wrapper"><a href="https://www.linkedin.com/events/7359692338895503361/" target="_blank" rel="noopener">https://www.linkedin.com/events/7359692338895503361/</a></span><br>Friday's Event - <span class="ml-rte-link-wrapper"><a href="https://www.linkedin.com/events/7359693582628196353/" target="_blank" rel="noopener">https://www.linkedin.com/events/7359693582628196353/</a></span><br></strong></p>






















<h2>Online Safety Act or Privacy Risk?</h2>
<p>Watch the discussion - <span class="ml-rte-link-wrapper"><a href="https://youtu.be/c9CzNOszjxI?t=248" target="_blank" rel="noopener">https://youtu.be/c9CzNOszjxI?t=248</a></span><span class="ml-rte-link-wrapper"></span></p>
<p>Under the UK’s new Online Safety Act, people now have to verify their age to use platforms like X, Reddit and Bluesky. That means millions are handing over biometric data, ID documents and even financial information to third-party companies outside the UK. Many of these firms have poor or unknown privacy track records, and some have ties to controversial figures or former intelligence officers.<br><br>Critics warn there’s no public oversight, no register of approved providers and no enforced privacy standards. The result is a system where your most sensitive data could end up in the hands of the cheapest bidder, stored in a country with weaker protections, with little way to know if it will ever be deleted. For most users, the choice is stark. Share the data or accept a censored internet.</p>
<p>A big thank you to Matt Gordon-Smith for messaging us and raising this point! Ant meant to give a shout-out in the episode but forgot!</p>
<p>Read more - <span class="ml-rte-link-wrapper"><a href="https://bylinetimes.com/2025/07/31/the-online-safety-act-is-forcing-brits-to-hand-over-personal-data-to-unregulated-overseas-corporations-with-questionable-privacy-records/" target="_blank" rel="noopener">https://bylinetimes.com/2025/07/31/the-online-safety-act-is-forcing-brits-to-hand-over-personal-data-to-unregulated-overseas-corporations-with-questionable-privacy-records/</a></span></p>
<p><strong>∠T</strong><strong>he Awareness Angle</strong></p>
<ul>
<li>
<strong>Privacy by Compulsion</strong><span> </span>– UK users are being forced to give facial scans, passport details and other sensitive data to unregulated foreign companies to access mainstream platforms.</li>
<li>
<p><strong>Trusting the Untrustworthy</strong><span> </span>– Some providers have a history of breaches or links to surveillance groups, with vague privacy policies that allow data reuse and AI training.</p>
</li>
<li>
<p><strong>No Real Oversight</strong><span> </span>– Without approved provider lists or mandatory standards, platforms can choose cost over safety when it comes to handling user data.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<h2>Microsoft Recall Still Spying on Your Screen</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/c9CzNOszjxI?t=587" target="_blank" rel="noopener">https://youtu.be/c9CzNOszjxI?t=587</a></p>
<p>Microsoft’s Recall feature on Copilot+ PCs is still capturing sensitive information, despite the company’s promises and new security filters. Tests by The Register showed that Recall can record credit card numbers, usernames and passwords if they appear on screen without obvious labels. Once saved, these screenshots can be accessed by anyone with the device’s PIN, even via remote access tools,  making it possible to bypass Microsoft’s security claims.</p>
<p>While Microsoft encrypts Recall data and ties access to Windows Hello, these measures are undermined by weak entry points like PIN access. Critics warn that the feature poses a significant privacy risk for everyday users, especially those in vulnerable situations. With Recall still in testing but expected to roll out widely, there are growing concerns it could quietly become the default on millions of devices before its flaws are fixed.</p>
<p>Read more - <span class="ml-rte-link-wrapper"><a href="https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/" target="_blank" rel="noopener">https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/</a></span></p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Security Bypassed by Simplicity</strong><span> </span>– Encryption means little if someone can unlock Recall with just your PIN, locally or remotely.</li>
<li>
<p><strong>Sensitive Data Still Slipping Through</strong><span> </span>– Credit cards, passwords and other personal info are still being stored, showing Recall’s detection logic is far from reliable.</p>
</li>
<li>
<p><strong>Privacy Implications for Vulnerable Users</strong><span> </span>– Once captured, private moments and personal data are permanently logged with little control over what’s kept or shared.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<h2>No MFA, No Coverage: Hamilton’s Costly Cyber Mistake</h2>
<p>Watch the discussion -<span> </span><a href="https://youtu.be/c9CzNOszjxI?t=892" target="_blank" rel="noopener">https://youtu.be/c9CzNOszjxI?t=892</a></p>
<p>In 2024, the City of Hamilton was hit by a ransomware attack that paralysed 80% of its systems. Hackers demanded $18.5 million, which the city refused to pay. Recovery costs have since exceeded $20 million and will continue into 2026.</p>
<p>City officials expected their $5 million cyber insurance policy to soften the blow, but the claim was denied. The reason? Many departments had failed to implement multi-factor authentication (MFA), a requirement clearly stated in the policy. Staff resistance to MFA slowed its rollout, and the insurer cited the lack of it as a “root cause” of the breach. Despite the scale of the incident, no individuals have been held accountable, leaving residents to foot the bill.</p>
<p>Read more - <span class="ml-rte-link-wrapper"><a href="https://www.cbc.ca/news/canada/hamilton/cybersecurity-breach-1.7597713" target="_blank" rel="noopener">https://www.cbc.ca/news/canada/hamilton/cybersecurity-breach-1.7597713</a></span></p>
<p><span class="ml-rte-link-wrapper"></span><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>MFA Neglect Has Real Costs</strong><span> </span>– Ignoring a basic security control didn’t just make the attack possible. It also voided insurance coverage.</li>
<li>
<p><strong>Resistance to Security = Vulnerability</strong><span> </span>– Internal pushback left critical systems exposed, showing that security culture matters as much as technology.</p>
</li>
<li>
<p><strong>Accountability Gap</strong><span> </span>– Leadership indecision and lack of ownership can multiply the damage from cyber incidents, both operationally and financially.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>


























<h2>This Week's Discussion Points...</h2>
<p><strong></strong><strong></strong><strong>UK Online Safety Act, age verification &amp; privacy risks</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=238" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://bylinetimes.com/2025/07/31/the-online-safety-act-is-forcing-brits-to-hand-over-personal-data-to-unregulated-overseas-corporations-with-questionable-privacy-records/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Microsoft Recall still capturing sensitive data</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=595" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>City of Hamilton ransomware &amp; MFA insurance refusal</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=881" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.cbc.ca/news/canada/hamilton/cybersecurity-breach-1.7597713" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Proton launches free cross-platform authenticator app</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=1109" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bleepingcomputer.com/news/security/proton-launches-free-standalone-cross-platform-authenticator-app/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>“Ghost store” scams selling fake weight-loss treatments</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=1304" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://cybernews.com/cybercrime/online-ghost-stores-target-shoppers-with-weight-loss-treatment-scam/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Calls to vet YouTube ads like TV ads</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=1582" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/ckge5xdwjx5o" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Google Salesforce breach via vishing, ShinyHunters</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=1851" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bleepingcomputer.com/news/security/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>Pandora cyberattack &amp; possible ShinyHunters link</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=2136" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.forbes.com/sites/daveywinder/2025/08/05/pandora-confirms-cyberattackwhat-you-need-to-know/" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>WhatsApp deletes 6.8m scam accounts</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=2375" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/ce35q2ly1w5o" target="_blank" rel="noopener">Read</a></strong></p>
<p><strong>North Korean IT workers funding regime</strong><br><strong><a href="https://youtu.be/c9CzNOszjxI?t=2532" target="_blank" rel="noopener">Watch</a></strong><span> </span>|<span> </span><strong><a href="https://www.bbc.co.uk/news/articles/c15wk77zxngo" target="_blank" rel="noopener">Read</a></strong><a href="https://www.bbc.co.uk/news/articles/c15wk77zxngo" target="_blank" rel="noopener"><strong></strong></a></p>
<p><a href="https://vm.tiktok.com/ZNdHwxPn3" target="_blank" rel="noopener"><strong></strong></a></p>
<p><strong>📬 Subscribe to the Newsletter</strong></p>
<p></p>
<p><a href="https://www.riskycreative.com/" target="_blank" rel="noopener">https://www.riskycreative.com</a></p>
<ul></ul>
<p><a href="https://www.instagram.com/reel/DH6DhqNorAj/?igsh=cm54OHh0dXVkMTh1" target="_blank" rel="noopener"></a></p>






















<h2>Instagram’s New Location Feature</h2>
<p>Watch - <span class="ml-rte-link-wrapper"><a href="https://youtu.be/c9CzNOszjxI?t=3872" target="_blank" rel="noopener">https://youtu.be/c9CzNOszjxI?t=3872</a></span></p>
<p><a href="https://securityonline.info/cve-2025-1240-winzip-vulnerability-opens-door-to-remote-code-execution/" target="_blank" rel="noopener"></a></p>






















<span><img class="img" alt="" src="https://storage.mlcdn.com/account_image/769696/ubJFcJtNxAUUHg0bsuDxzJWirYiPo8Wmgbb7a88x.png" width="540" onerror="this.style.display='none'"></span>

























<p>Instagram has added a location-sharing feature in the inbox that can show your followers where you last posted from. If location permissions are on, this might be enabled by default.</p>
<p>That might sound harmless, but think about it! The people who follow you on Instagram aren’t always close friends. They could be old acquaintances, casual contacts, or even people you barely know. Do you really want all of them to know your current or recent location?</p>
<p><strong>How to switch it off</strong></p>
<ol>
<li>
<p>Open Instagram and go to your<span> </span><strong>Inbox</strong>.</p>
</li>
<li>
<p>Tap the<span> </span><strong>pin/Friends Map</strong><span> </span>banner above Notes.</p>
</li>
<li>
<p>Select<span> </span><strong>Location settings</strong>.</p>
</li>
<li>
<p>Turn off<span> </span><strong>Share location</strong><span> </span>and<span> </span><strong>Show on map</strong>. If you see<span> </span><strong>Visibility</strong>, set it to<span> </span><strong>No one</strong>.</p>
</li>
</ol>
<p>For extra privacy, you can also remove Instagram’s location permission in your phone’s settings.</p>
<p>⚠️ Some users report this feature may not be available in the UK or EU yet, but it’s worth checking so you’re ready if or when it arrives.</p>
<p><strong>∠The Awareness Angle</strong></p>
<ul>
<li>
<strong>Assumed Trust</strong><span> </span>– Just because someone follows you on Instagram does not mean you want them to know where you are. Location sharing blurs the line between friendly connection and personal exposure.</li>
<li>
<p><strong>Default On, Default Risk</strong><span> </span>– If you have location permissions enabled, this feature may be switched on without you realising, making it easy to overshare.</p>
</li>
<li>
<p><strong>Check Before It Spreads</strong><span> </span>– Even if it is not live in your region yet, keep checking your settings so you will not be caught off guard when it rolls out.</p>
</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>


























<h3>Thanks for reading! If you’ve spotted something interesting in the world of cyber this week — a breach, a tool, or just something a bit weird — let us know at<span> </span><span class="ml-rte-link-wrapper"><a href="mailto:hello@riskycreative.com" target="_blank" rel="noopener">hello@riskycreative.com</a></span>. We’re always learning, and your input helps shape future episodes.</h3>











</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/149256?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/149256?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F149256%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F149256%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame></template></turbo-stream>

<turbo-stream action="remove" target="posts_load_more"></turbo-stream>

  <turbo-stream action="append" target="posts_list"><template><turbo-frame id="posts_load_more">
  <a data-turbo-stream="true" data-controller="infinite-scroll" href="/supporters/load_more?last_id=149256&amp;last_live_at=2025-08-11T05%3A00%3A00.000%2B00%3A00&amp;order=desc"></a>
  <div class="loader">
  <svg class="loader__icon" viewBox="0 0 100 100">
    <circle class="loader__circle" cx="50" cy="50" r="45" />
  </svg>
</div>
</turbo-frame>
</template></turbo-stream>
