<turbo-stream action="append" target="posts_list"><template><turbo-frame class="main-list__list-item" data-testid="Post" id="post_207284">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/207284/watch_times"
  data-youtube-player-video-id-value="HeF0pPB2mfA"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/HeF0pPB2mfA/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/207284">
          Feb 16, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/207284">
            Discord Exposed. Apple Exploited. AI Investment Scams
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, 70,000 government ID images are exposed in a Discord age verification breach, staff data is hit at the European Commission, and supplier fallout ripples out to Volvo Group after a third party incident. More data. More dependency. More risk.</p>
<p class="ember-view reader-text-block__paragraph">We also cover Apple’s emergency zero day patch already being exploited in the wild, a devastating AI deepfake investment scam that cost an 82 year old nearly £200,000, and fresh concerns around autonomous AI agents expanding enterprise attack surfaces faster than governance can keep up.</p>
<p class="ember-view reader-text-block__paragraph">On top of that, we get into the backlash around Ring’s Super Bowl advert and surveillance partnerships, why some organisations are banning Notepad++ instead of simply patching it, and how email bombing is still being used to quietly bury real account compromise in a flood of noise.</p>
<p class="ember-view reader-text-block__paragraph">All of that, and a few strong opinions along the way, in this week’s edition of The Awareness Angle.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle is best served in full. Watch on YouTube, listen on Spotify, Apple Podcasts, or wherever you get your podcasts. If you like your cyber news with context, challenge, and the occasional raised eyebrow, this one’s for you.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or listen to the episode today -<span class="white-space-pre"> </span></strong><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<h2 class="ember-view reader-text-block__heading-2">This Week's Stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Discord Faces Backlash After Age Verification Breach</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=143" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/technology/s/BpQk59xUL5" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Around 70,000 government issued ID images were exposed after a third party provider used for age verification was compromised. These were not usernames. Not email addresses. Actual passport and driving licence images.</p>
<p class="ember-view reader-text-block__paragraph">This is where the age verification debate gets uncomfortable.</p>
<p class="ember-view reader-text-block__paragraph">We said on the podcast that this is the trade off problem in real time. If platforms require more sensitive data to prove age, the impact of failure increases massively. And crucially, it is not just about trusting the platform. It is about trusting who they trust.</p>
<p class="ember-view reader-text-block__paragraph">This was not Discord’s core infrastructure being breached. It was a supplier in the chain. But to the user whose passport is now exposed, that distinction does not matter.</p>
<p class="ember-view reader-text-block__paragraph">Searches for Discord alternatives reportedly spiked after the story broke. That is what trust erosion looks like.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>More Data, More Risk</strong><span class="white-space-pre"> </span>– The more sensitive the data collected, the higher the impact if breached.</li>
<li>
<strong>Third Parties Matter</strong><span class="white-space-pre"> </span>– Your risk extends to every supplier in the chain.</li>
<li>
<strong>Trust Has a Cost</strong><span class="white-space-pre"> </span>– Safety controls must not create bigger privacy problems.European Commission Discloses Staff Data Breach</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">European Commission Discloses Staff Data Breach</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=387" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.bleepingcomputer.com/news/security/european-commission-discloses-breach-that-exposed-staff-data/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">The European Commission confirmed a breach affecting a system used to manage staff mobile devices. Personal data such as names and contact details may have been accessed. There is currently no indication that classified systems were compromised.</p>
<p class="ember-view reader-text-block__paragraph">The bigger issue is what happens next.</p>
<p class="ember-view reader-text-block__paragraph">Internal directories and HR data are high value targets. Once exposed, they fuel phishing, impersonation and social engineering.</p>
<p class="ember-view reader-text-block__paragraph">Containment reportedly happened within hours. But the exposure still matters.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Staff Data Is High Value</strong><span class="white-space-pre"> </span>– Internal directories and HR data are prime targeting fuel.</li>
<li>
<strong>Breaches Enable Follow On Attacks</strong><span class="white-space-pre"> </span>– Exposure often leads to phishing and impersonation.</li>
<li>
<strong>Compliance Is Not Immunity</strong><span class="white-space-pre"> </span>– Even major institutions remain attractive targets.</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Volvo Group Impacted by Conduent Supplier Breach</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=537" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://securityaffairs.com/187875/security/volvo-group-hit-in-massive-conduent-data-breach.html?web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Volvo Group has been named among organisations impacted by a cyberattack at IT services provider Conduent.</p>
<p class="ember-view reader-text-block__paragraph">This is another reminder that your organisation’s risk surface is bigger than your own firewall.</p>
<p class="ember-view reader-text-block__paragraph">Conduent provides back office services such as document processing and administrative support. When a service provider like that is breached, the impact cascades outward. One breach can affect dozens, sometimes hundreds, of downstream organisations.</p>
<p class="ember-view reader-text-block__paragraph">We have said it before, but this is third party concentration risk in action. If one supplier services many large brands, the blast radius expands dramatically.</p>
<p class="ember-view reader-text-block__paragraph">Volvo is not alone here. And that is the point.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Third Party Risk Is Shared Risk</strong><span class="white-space-pre"> </span>– Your exposure includes your suppliers.</li>
<li>
<strong>One Breach, Many Victims</strong><span class="white-space-pre"> </span>– Service providers create amplified blast radius.</li>
<li>
<strong>Supply Chain Visibility Matters</strong><span class="white-space-pre"> </span>– Know who holds your data, and how it is protected.</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Apple Fixes Actively Exploited Zero Day</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=686" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Apple released emergency updates to patch a zero day vulnerability described as being used in “extremely sophisticated” attacks.</p>
<p class="ember-view reader-text-block__paragraph">When a vendor confirms exploitation is already happening, patching becomes urgent.</p>
<p class="ember-view reader-text-block__paragraph">These flaws are rarely theoretical. They are used in targeted campaigns. Targeted does not mean rare. It means deliberate.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Zero Days Are Real World</strong><span class="white-space-pre"> </span>– These are not theoretical flaws. They are exploited.</li>
<li>
<strong>Targeted Does Not Mean Safe</strong><span class="white-space-pre"> </span>– Sophisticated attacks still affect everyday users.</li>
<li>
<strong>Update Culture Matters</strong><span class="white-space-pre"> </span>– Fast patching is still one of the strongest defences.</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">82 Year Old Loses £200k in AI Deepfake Investment Scam</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=1189" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://discover.swns.com/2026/02/gran-82-loses-200k-retirement-savings-in-ai-deepfake-doctor-scam/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">An 82 year old grandmother lost nearly £200,000 after seeing what appeared to be a trusted doctor promoting an investment opportunity in a professional looking video.</p>
<p class="ember-view reader-text-block__paragraph">It was AI generated.</p>
<p class="ember-view reader-text-block__paragraph">The scam did not rely on broken English or obvious red flags. It relied on authority bias, emotional manipulation, and realism. Conversations continued over Messenger. Funds were moved into cryptocurrency. The emotional driver was securing care for her autistic grandson.</p>
<p class="ember-view reader-text-block__paragraph">We said this on the show. This is not clumsy phishing. This is AI realism combined with psychology.</p>
<p class="ember-view reader-text-block__paragraph">One comment we discussed summed it up well. It is easy to look at stories like this and think gullible old people. But the speed at which AI is improving should make all of us pause. The bar for deception is rising quickly.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Trust Can Be Faked</strong><span class="white-space-pre"> </span>– Familiar faces are no longer proof.</li>
<li>
<strong>Crypto Is Hard to Reverse</strong><span class="white-space-pre"> </span>– Once funds move, recovery is unlikely.</li>
<li>
<strong>Emotion Drives Decisions</strong><span class="white-space-pre"> </span>– Scammers exploit care, not just greed.</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This Week's Discussion Points...</h2>
<h3 class="ember-view reader-text-block__heading-3">🔎 Breach Watch</h3>
<p class="ember-view reader-text-block__paragraph"><strong>Discord Age Verification Breach Exposes 70,000 Government IDs</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=143" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/technology/s/BpQk59xUL5" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>European Commission Discloses Staff Data Breach</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=387" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.bleepingcomputer.com/news/security/european-commission-discloses-breach-that-exposed-staff-data/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Volvo Group Impacted by Conduent Data Breach</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=537" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://securityaffairs.com/187875/security/volvo-group-hit-in-massive-conduent-data-breach.html?web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Apple Fixes Zero Day Used in Highly Sophisticated Attacks</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=686" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.bleepingcomputer.com/news/security/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Our Org Is Banning Notepad++ After Supply Chain Concerns</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=970" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/cybersecurity/s/Kofbd9v2ZE" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">📰 News</h3>
<p class="ember-view reader-text-block__paragraph"><strong>82 Year Old Loses £200k in AI Deepfake Doctor Investment Scam</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=1189" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://discover.swns.com/2026/02/gran-82-loses-200k-retirement-savings-in-ai-deepfake-doctor-scam/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Reddit discussion:<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/technology/comments/1qyj0cc/gran_82_loses_200k_retirement_savings_in_ai" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Amazon Distances Itself From Flock Safety After Ring Super Bowl Backlash</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=1456" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.nbcnews.com/news/us-news/amazon-no-longer-working-police-tech-flock-safety-super-bowl-ad-rcna258855" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>How to Recognise a Deepfake, and Why It Is Getting Harder</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=1730" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.kaspersky.com/blog/how-to-recognize-a-deepfake/55247/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>OpenClaw Integrates VirusTotal After Enterprise Risk Warnings</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2292" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.csoonline.com/article/4129393/openclaw-integrates-virustotal-malware-scanning-as-security-firms-flag-enterprise-risks.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">💬 Discussion &amp; Extras</h3>
<p class="ember-view reader-text-block__paragraph"><strong>Cloudflare “ClickFix” Style Fake Verification Page</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2515" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/Wellthatsucks/s/klOYeGfyX3" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Email Bomb Used to Hide a Real Security Alert</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2685" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.reddit.com/r/phishing/s/tGGj3f8u2k" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>The CivDiv No.1 TikTok Account Recommendation</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2830" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.tiktok.com/@thecivdiv.no1?_r=1&amp;_t=ZS-93n2DfFHoNo" target="_blank" rel="noopener"><strong>TikTok</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Most Common 4 Digit PIN Numbers Visualised</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2994" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>QR Code Binder for Child Safe YouTube Access</strong><span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=3158" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<h2 class="ember-view reader-text-block__heading-2">And finally...LinkedIn AI Caricature Trend Raises Oversharing Questions</h2>
<p>See content credentials<span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQHVE9J56R5trA/article-inline_image-shrink_1500_2232/B4EZxhgCO.IYAU-/0/1771162316934?e=1772668800&amp;v=beta&amp;t=2MjW0Hs2EwPvpVMTWDE3l3L0GzMvdBg2rgFvqPMsKLE" onerror="this.style.display='none'"></span>Can you guess my password from this?</p>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://youtu.be/HeF0pPB2mfA?t=2586" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.linkedin.com/posts/matthewjary_theres-a-fun-trend-circling-at-the-mo-inviting-activity-7426532949833076736--saZ" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph">A new trend circulating on LinkedIn has people using AI to generate caricature style action figure versions of themselves. These posts often include job titles, hobbies, favourite sports teams, pets, cities, personality traits and sometimes even family details.</p>
<p class="ember-view reader-text-block__paragraph">The trend itself feels creative and harmless. But a post this week from<span class="white-space-pre"> </span><a class="ember-view" href="https://www.linkedin.com/in/matthewjary/" target="_blank" rel="noopener">Matthew Jary</a><span class="white-space-pre"> </span>highlighted something worth pausing on. When you scroll through a feed full of these, you start learning a surprising amount about complete strangers.</p>
<p class="ember-view reader-text-block__paragraph">Individually, each detail seems insignificant. Collectively, they form a profile.</p>
<p class="ember-view reader-text-block__paragraph">Many of the attributes being shared mirror the kinds of prompts commonly used in password reset questions and social engineering attempts. First pet. Favourite team. Hometown. Employer.</p>
<p class="ember-view reader-text-block__paragraph">But here’s the alternative view.</p>
<p class="ember-view reader-text-block__paragraph">Is this actually an issue?</p>
<p class="ember-view reader-text-block__paragraph">Most of us openly share our job titles, employers, locations and interests on LinkedIn every day. That is the whole point of the platform. So is this genuinely risky, or is this just the latest “security people hate fun” moment? Is this simply anti bandwagon commentary?</p>
<p class="ember-view reader-text-block__paragraph">Maybe.</p>
<p class="ember-view reader-text-block__paragraph">The difference might not be the individual data point. It might be the packaging. When everything is neatly summarised in one visual snapshot, it lowers the effort required to profile someone.</p>
<p class="ember-view reader-text-block__paragraph">This is not about banning fun. It is about understanding aggregation. Attackers do not always need a breach when information is voluntarily shared and easily searchable.</p>
<p class="ember-view reader-text-block__paragraph">The risk is rarely one post. It is the accumulation.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Small Data Adds Up</strong><span class="white-space-pre"> </span>– Individual facts feel harmless. Combined, they become profile building fuel.</li>
<li>
<strong>OSINT Is Powerful</strong><span class="white-space-pre"> </span>– Attackers do not need a database leak if the information is public.</li>
<li>
<strong>Aggregation Changes Context</strong><span class="white-space-pre"> </span>– One detail is normal. A curated snapshot lowers the barrier for profiling.</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="ScJEQMrjIxJDFMQaFGTNWWiHvkqqtasVltuQ " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
<p class="ember-view reader-text-block__paragraph">All views and opinions are our own and do not reflect those of our employers.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/207284?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/207284?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F207284%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F207284%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_205459">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/205459/watch_times"
  data-youtube-player-video-id-value="joGd0M8Fw8o"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/joGd0M8Fw8o/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/205459">
          Feb 9, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/205459">
            Supply Chain Hacks. Fake Encryption. Phones That Track You
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<h1>Supply Chain Hacks. Fake Encryption. Phones That Track You</h1>

























<a href="https://youtu.be/joGd0M8Fw8o" target="_blank" rel="noopener"><span><img class="img" alt="" src="https://storage.mlcdn.com/account_image/769696/lJoxInSqvVgjfUAVeWlwcRUlI1rrWP7gFabWRisA.png" width="540" onerror="this.style.display='none'"></span></a>

























<p>This week on The Awareness Angle, a developer tool update chain gets quietly hijacked, ransomware actors claim access to airport systems, and law enforcement moves in on a major hacking forum, with questions over how much impact that will really have.</p>
<p>We also look at how phones can be tracked at the network level without apps or permission, why McDonald’s felt the need to call out terrible password habits, and how a chaotic extortion group is turning data breaches into deeply personal harassment campaigns. On top of that, Spain is moving to ban social media for under 16s, and questions are resurfacing about whether end to end encryption really means what people think it does.</p>
<p>All of that, and more, in this week’s edition of The Awareness Angle.</p>
<p>The Awareness Angle is best served in full. Watch on YouTube, or listen on Spotify or your favourite podcast platform to get the complete discussion and context.<br><br></p>
<p>🎧 Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="150" src="https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="img" height="48" src="https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>


































































<h2>This week's stories...</h2>
<h3>Notepad++ update chain compromised</h3>
<p><a href="https://youtu.be/joGd0M8Fw8o?t=123" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://cybernews.com/security/state-sponsored-hackers-behind-notepad-plus-plus-hack/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Notepad++, a tool a lot of developers use without a second thought, was caught up in a supply chain attack that didn’t touch the code at all. Instead, attackers went after the update process. Between June and December 2025, a small number of users were redirected to malicious update files through the hosting infrastructure.</p>
<p>This wasn’t random. It looks deliberate and targeted, likely aimed at developers or organisations working on sensitive projects. The software itself was fine, but the trust people place in automatic updates was the weak point. Notepad++ has since moved hosting providers, tightened up how updates are verified, and confirmed that versions 8.8.9 and above are safe.</p>
<p>It’s one of those stories that feels uncomfortable because it hits a blind spot. We trust tools like this precisely because they are familiar and boring.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>The risk lived outside the app</strong><span> </span>- The problem wasn’t what people installed, it was what they never see, the update mechanism.</li>
<li>
<strong>Targeted still counts</strong><span> </span>- You don’t need to hit everyone, just the right few people.</li>
<li>
<strong>Choice brings exposure</strong><span> </span>- Every extra tool adds convenience and risk, which is why organisations try to limit what gets installed.</li>
</ul>
<p></p>
<h3>Ransomware group claims access to airport systems</h3>
<p><a href="https://youtu.be/joGd0M8Fw8o?t=453" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.techradar.com/pro/security/russian-ransomware-hackers-allegedly-hit-tulsa-airport-in-cyberattack-dump-private-files-online-as-proof" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>A ransomware group is claiming it breached systems linked to Tulsa International Airport and has begun dumping internal files online as proof. The attackers say the data includes internal emails, employee IDs, passports, and financial documents. At the time of reporting, the airport has not publicly confirmed the breach and the leaked material has not been independently verified.</p>
<p>That uncertainty is part of the tactic. Modern ransomware groups do not just rely on encryption or extortion notes. They use public claims and data leaks to create pressure, force attention, and shape the narrative before facts are fully known. Airports are particularly exposed to this kind of pressure because disruption, even perceived disruption, carries immediate reputational and operational weight.</p>
<p>Verified or not, once claims and files are public, the human impact starts straight away.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Pressure starts before proof</strong><span> </span>- Publishing claims and documents is designed to trigger panic and rushed decisions.</li>
<li>
<strong>Visibility increases impact</strong><span> </span>- Highly visible organisations feel the reputational damage faster, even when details are unclear.</li>
<li>
<strong>Pause is a defence</strong><span> </span>- Calm, verification, and controlled communication matter more than speed in moments like this.</li>
</ul>
<p></p>
<h3>Your phone can be tracked without your permission, and most people do not realise it</h3>
<p><a href="https://youtu.be/joGd0M8Fw8o?t=1350" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://fumics.in/posts/2026-02-01-phone-gps-carrier-tracking" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>Most people think they understand how location tracking works. If an app does not have permission, or GPS is turned off, they assume their phone is no longer sharing where they are. This story shows that is not how it actually works.</p>
<p>Mobile networks can locate phones at the carrier level using systems originally built for emergency services. This sits below iOS and Android, which means your phone never asks you, and you never see it happening. It is not malware and it is not a bug. It is how mobile infrastructure has worked for years.</p>
<p>When we talked about this on the podcast, the bit that really landed was how normal this feels once you realise it has been there the whole time. The technology did not change. Our assumptions did.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Permissions feel reassuring</strong><span> </span>- Turning things off gives a sense of control, even when it does not change the outcome.</li>
<li>
<strong>The real risk is invisible</strong><span> </span>- Tracking can happen below apps and operating systems people interact with.</li>
<li>
<strong>Assumptions shape behaviour</strong><span> </span>- When beliefs are wrong, people take risks without realising it.</li>
</ul>



























































<h2>This Week's Discussion Points...</h2>
<p><strong>Notepad++ supply chain attack</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=123" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://cybernews.com/security/state-sponsored-hackers-behind-notepad-plus-plus-hack/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Ransomware group claims access to airport systems</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=453" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.techradar.com/pro/security/russian-ransomware-hackers-allegedly-hit-tulsa-airport-in-cyberattack-dump-private-files-online-as-proof" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>FBI seizes RAMP hacking forum</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=583" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.itpro.com/security/cyber-crime/the-fbi-has-seized-the-ramp-hacking-forum-but-will-the-takedown-stick-history-tells-us-otherwise" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Lawsuit claims WhatsApp encryption is a lie</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=736" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://9to5mac.com/2026/02/03/lawsuit-claims-whatsapp-encryption-is-a-lie-cryptography-professor-weighs-in/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Spain announces social media ban for under 16s</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=974" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.abc.net.au/news/2026-02-03/social-media-ban-spain/106302026" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Your phone can be tracked without your permission</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=1350" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://fumics.in/posts/2026-02-01-phone-gps-carrier-tracking" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Scattered Lapsus ShinyHunters extortion tactics</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=1608" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Ransomware attacks up 30 percent</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=1810" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://thecyberexpress.com/ransomware-attacks-soar-30-percent/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Ant's mum targeted by follow up scam call</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=2060" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<p><strong>McDonald’s calling out weak passwords</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=2206" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.theregister.com/2026/02/02/mcdonalds_password_advice/" target="_blank" rel="noopener">Read</a></p>
<p><strong>Getting your first job in cybersecurity</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=2552" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://shehackspurple.ca/2025/11/21/how-to-get-your-first-job-in-cybersecurity/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p><strong>Real or phishing, shockingly bad campaign emails</strong><span> </span><a href="https://youtu.be/joGd0M8Fw8o?t=2810" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://vm.tiktok.com/ZNRDcrjUP/" target="_blank" rel="noopener"><strong>Read</strong></a></p>





























<h2>And finally...McDonald’s calling out weak passwords, and it lands because it’s honest</h2>

























<span><img class="img" alt="" src="https://storage.mlcdn.com/account_image/769696/LO9bLElIwHlTgJ1zbjfEOZN73ZoMozeKaQLy7Yke.png" width="540" onerror="this.style.display='none'"></span>






















<p><a href="https://youtu.be/QsoH3G7GfU0?t=2029" target="_blank" rel="noopener"></a></p>
<p><a href="https://youtu.be/edRdK5HrKlw?t=2680" target="_blank" rel="noopener"></a><a href="https://youtu.be/fuG0UsphrS8?t=1600" target="_blank" rel="noopener"><strong></strong></a><a href="https://youtu.be/XpjyRa2W0m0?t=2834" target="_blank" rel="noopener">Watch</a></p>
<p>McDonald’s Netherlands used Change Your Password Day to highlight something security teams have been saying for years. People choose passwords based on things they like, recognise, or can remember. BigMac, HappyMeal, McNuggets, and endless variations of them showed up tens of thousands of times in breached password data.</p>
<p>As we said on the show, this works because it doesn’t pretend people are suddenly going to behave like security professionals. It accepts reality and designs around it.</p>
<p>Predictability is the real problem. Swapping letters for numbers or adding a symbol feels clever, but attackers expect it. Tools try those combinations automatically. The habit hasn’t changed, even though the threat has.</p>
<p>What’s interesting is how transferable this idea is. Almost any organisation could do a version of this with their own language, products, acronyms, or in jokes. When people see themselves reflected in the message, it lands very differently.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Familiar beats secure</strong><span> </span>- People choose passwords that feel personal and memorable, not resilient.</li>
<li>
<strong>Old advice lingers</strong><span> </span>- Leetspeak and small tweaks still feel protective, even though they stopped working years ago.</li>
<li>
<strong>Make it local</strong><span> </span>- Campaigns are more effective when people recognise their own habits and language in the message.</li>
</ul>
<p>Would you try this in your organisation?  Let us know by getting in touch at<span> </span>hello@riskycreative.com</p>







</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/205459?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/205459?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F205459%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F205459%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_203508">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/203508/watch_times"
  data-youtube-player-video-id-value="Knl7yOkWRwo"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/Knl7yOkWRwo/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/203508">
          Feb 2, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/203508">
             From Dating App Leaks to AI Agent Risks
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on<span class="white-space-pre"> </span><strong>The Awareness Angle</strong>, we cover hundreds of exposed Clawdbot and Moltbot AI agent gateways leaking credentials and private chats, a new malware service selling guaranteed phishing extensions through the Chrome Web Store, and sensitive government documents uploaded to ChatGPT by the acting head of the US cybersecurity agency.</p>
<p class="ember-view reader-text-block__paragraph">We also look at Google rolling out stronger ransomware protections in Drive, France accelerating plans to ban social media for under 15s, and what recent incidents involving AI powered toys reveal about data exposure risks for children.</p>
<p class="ember-view reader-text-block__paragraph">All of that, and more, in this week’s episode of<span class="white-space-pre"> </span><strong>The Awareness Angle</strong>.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle is best served in full. Watch on YouTube, or listen on Spotify or your favourite podcast platform to get the complete discussion and context.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or listen to the episode today -<span class="white-space-pre"> </span></strong><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Support the show with all new Awareness Angle merch. Stickers, notebooks, mugs, and bits that quietly say you care about people, not just passwords. Click<span class="white-space-pre"> </span></strong><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://riskycreative.com/en-gbp/collections/all" target="_blank" rel="noopener"><strong>here</strong></a><strong><span class="white-space-pre"> </span>to visit the shop.</strong></p>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQGpU2i5wxd5_A/article-inline_image-shrink_1000_1488/B4EZwbaaCxJ4AU-/0/1769986434411?e=1771459200&amp;v=beta&amp;t=RMM6hxNqdHqHc4WywELWg_gUCKjGT6LxfoX1btVysQI" onerror="this.style.display='none'"></span>Just some of the exciting new merchadise you can buy!</p>
<h2 class="ember-view reader-text-block__heading-2">This week's stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Hundreds of exposed Clawdbot gateways leave credentials and private chats exposed</h3>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=782" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://cybersecuritynews.com/clawdbot-chats-exposed/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Security researchers have identified more than 900 exposed Clawdbot gateways online, caused by poor setup and insecure default settings. These exposed systems allowed access to private conversations, API keys, and other sensitive information.</p>
<p class="ember-view reader-text-block__paragraph">Clawdbot, also known as Moltbot, is an AI agent designed to make work easier by remembering information and acting on a user’s behalf inside messaging apps. Because it runs continuously and stores context over time, mistakes in setup can quietly expose far more than people realise.</p>
<p class="ember-view reader-text-block__paragraph">Incidents like this often happen without malicious intent. Tools are adopted quickly to save time, experiments move into daily use, and security steps are skipped under pressure. The result is exposure created by normal human behaviour, not bad actors.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>People prioritise speed and convenience</strong><span class="white-space-pre"> </span>– Security steps are often skipped to get work done</li>
<li>
<strong>Assumptions replace checks</strong><span class="white-space-pre"> </span>– If a tool feels helpful and familiar, risk is easily overlooked</li>
<li>
<strong>Psychological safety matters</strong><span class="white-space-pre"> </span>– People need to feel safe admitting mistakes before exposure grows</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">New malware service pushes phishing extensions into the Chrome Web Store</h3>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=1173" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span></p>
<p class="ember-view reader-text-block__paragraph">Researchers have uncovered a new malware service called Stanley that allows criminals to create phishing browser extensions and successfully publish them to the Chrome Web Store. These extensions are designed to overlay legitimate websites with fake content while keeping the real web address visible, making them difficult to spot.</p>
<p class="ember-view reader-text-block__paragraph">The service is sold in tiers, offering features such as silent installation, custom branding, and a management panel for attackers. Because the extensions pass official store checks, users are more likely to trust them, install them, and continue using them without suspicion.</p>
<p class="ember-view reader-text-block__paragraph">This type of attack relies less on technical exploitation and more on habit. People install extensions to save time, solve small problems, or boost productivity, often without revisiting what access those extensions still have later on.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Trust is built on familiarity</strong><span class="white-space-pre"> </span>– Official stores and recognisable browsers lower people’s guard</li>
<li>
<strong>Convenience drives behaviour</strong><span class="white-space-pre"> </span>– Small productivity gains can outweigh perceived risk</li>
<li>
<strong>Unused access is rarely questioned</strong><span class="white-space-pre"> </span>– Extensions often stay installed long after they are needed</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">France moves to fast track a social media ban for under 15s</h3>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=1824" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://edition.cnn.com/2026/01/25/europe/macron-france-under-15-social-media-ban-intl" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">France has announced plans to fast track a ban on social media use for children under 15, with the aim of having new rules in place before the next school year. The proposal includes stricter age verification and builds on existing restrictions around mobile phone use in schools.</p>
<p class="ember-view reader-text-block__paragraph">The move follows similar action in Australia, where millions of under 16 social media accounts have already been removed. French officials have acknowledged that age limits can be bypassed, but see this as an important first step in reducing exposure to online harm and emotional manipulation.</p>
<p class="ember-view reader-text-block__paragraph">Rather than focusing on individual behaviour, the approach shifts responsibility toward platforms and regulation, recognising that expecting children to self regulate in highly persuasive online environments has not worked.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Children are not the problem</strong><span class="white-space-pre"> </span>– Platforms are designed to capture attention, not protect wellbeing</li>
<li>
<strong>Rules fill the gaps left by design</strong><span class="white-space-pre"> </span>– Regulation steps in where controls and safeguards fall short</li>
<li>
<strong>Adults set the environment</strong><span class="white-space-pre"> </span>– Safety improves when responsibility moves away from the user</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">US cybersecurity chief uploaded sensitive government documents to ChatGPT</h3>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=413" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://techcrunch.com/2026/01/28/trumps-acting-cybersecurity-chief-uploaded-sensitive-government-docs-to-chatgpt/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">The acting head of Cybersecurity and Infrastructure Security Agency uploaded internal government documents marked “for official use only” into ChatGPT. The uploads triggered automated warnings, and an internal review is now assessing any potential impact.</p>
<p class="ember-view reader-text-block__paragraph">The documents were described as internal but unclassified, and the use of ChatGPT was said to be short term and previously approved as an exception. Following the incident, multiple staff members were suspended from accessing classified systems while investigations continue.</p>
<p class="ember-view reader-text-block__paragraph">The story highlights how quickly everyday tools can blur boundaries at work, especially when people are under pressure to move fast or solve problems efficiently.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>People default to familiar tools</strong><span class="white-space-pre"> </span>– Convenience often overrides caution</li>
<li>
<strong>Exceptions create confusion</strong><span class="white-space-pre"> </span>– One off permissions weaken shared understanding of risk</li>
<li>
<strong>Hierarchy does not prevent mistakes</strong><span class="white-space-pre"> </span>– Senior roles are not immune to everyday human error</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">Discussion Points...</h2>
<p class="ember-view reader-text-block__paragraph"><strong>ShinyHunters swipes right on 10M records in alleged dating app data grab</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=71" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.theregister.com/2026/01/29/shinyhunters_match_group" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>US cybersecurity chief uploaded sensitive documents to ChatGPT</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=412" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://techcrunch.com/2026/01/28/trumps-acting-cybersecurity-chief-uploaded-sensitive-government-docs-to-chatgpt/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>What is Clawdbot and why it matters</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=628" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://socradar.io/blog/clawdbot-is-it-safe/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Hundreds of exposed Clawdbot gateways leave data vulnerable</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=782" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://cybersecuritynews.com/clawdbot-chats-exposed/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>The AI agent craze is turning into a security nightmare</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=978" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.techbrew.com/stories/2026/01/29/moltbot-agentic-ai-security-privacy" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Phishing malware sold as Chrome extensions</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=1173" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Google Drive adds better ransomware protection</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=1520" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://tech.yahoo.com/ai/gemini/articles/google-drive-getting-better-protection-191341072.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>France moves to ban social media for under 15s</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=1812" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://edition.cnn.com/2026/01/25/europe/macron-france-under-15-social-media-ban-intl" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Exposed admin panel found in AI toy</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=2121" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://thecyberexpress.com/security-researcher-finds-ai-toy-admin-panel/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Awareness, spotting phishing and AI content</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=2611" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.bbc.co.uk/news/videos/cn82p0dgwv5o" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Misleading breach headlines and fake panic</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=2985" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.reddit.com/r/GMail/s/T0NkHX4RIE" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Reverse image search exposing fake profiles</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3099" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.reddit.com/r/isthisAI/s/qqyWrMrpJU" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Gift card scam warnings appearing in stores</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3186" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.linkedin.com/posts/robertconnor-cybersecurityspecialist_cybersecurity-fraudawareness-businessrisk-activity-7418996137233113088-6LW_" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Covering phone cameras as a security habit</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3271" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.reddit.com/r/security/comments/1qp5okt/why/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Free WiFi on flight QR code prank</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3372" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://vm.tiktok.com/ZNRSaHKQT/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>TikTok Argos MacBook discount scam</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3477" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://vm.tiktok.com/ZNRAqayQ4/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Real world phishing and family account compromise</strong><span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3636" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<h2 class="ember-view reader-text-block__heading-2">And finally...This Week I Messed Up!<span class="white-space-pre"> </span>
</h2>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQElTd-kDLx2fw/article-inline_image-shrink_1000_1488/B4EZwbdx8nKwAQ-/0/1769987321711?e=1771459200&amp;v=beta&amp;t=278wi6Wsu1B0lRy7qG5Pm8lmj3rxEhGbaW0qWrn5msQ" onerror="this.style.display='none'"></span>I messed up and didn't protect those closest to me!</p>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://youtu.be/Knl7yOkWRwo?t=3640" target="_blank" rel="noopener">Watch</a></p>
<p class="ember-view reader-text-block__paragraph">This week, the story that hit closest to home wasn’t a breach headline or an AI scare. It was my mum.</p>
<p class="ember-view reader-text-block__paragraph">Her email account was compromised, no two factor authentication, a password she’d used for years, and attackers quietly sending gift card scam emails to people she trusts. I only spotted it once messages started disappearing from her inbox.</p>
<p class="ember-view reader-text-block__paragraph">When I got proper access, the reason was obvious. The attackers had set up inbox rules to automatically mark messages as read, move them into hidden folders, and silently redirect copies to a Gmail account they controlled. From the outside, everything looked normal.</p>
<p class="ember-view reader-text-block__paragraph">I spend my life talking about security awareness, and I still hadn’t locked down the person closest to me.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Inbox rules are a red flag</strong><span class="white-space-pre"> </span>– attackers often use filters and redirects to hide their activity and stay undetected</li>
<li>
<strong>No 2FA is still a big risk</strong><span class="white-space-pre"> </span>– even “quiet” email compromises can run for days without being noticed</li>
<li>
<strong>Check your family, not just your workplace</strong><span class="white-space-pre"> </span>– the people closest to you are often the least protected</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">It’s a reminder that security isn’t just an organisational problem. It’s personal. Take five minutes this week to check in on someone you care about.</p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="uzjjmrpxQeFebnMdUxptiDBQagtayOyxaRvLs " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
<p class="ember-view reader-text-block__paragraph">All views and opinions are our own and do not reflect those of our employers.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/203508?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/203508?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F203508%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F203508%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_200933">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/200933/watch_times"
  data-youtube-player-video-id-value="XpjyRa2W0m0"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/XpjyRa2W0m0/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/200933">
          Jan 26, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/200933">
            Voice Phishing Kits, CrashFix Malware, and Schools Forced Offline
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, we cover a ransomware attack at Ingram Micro that disrupted a major part of the global IT supply chain, alongside a breach at Grubhub where customer, driver, and merchant data was accessed through a third party support system. We also look at a data breach at the Minnesota Department of Human Services affecting nearly 304,000 people, and a UK secondary school forced to close after a cyber attack knocked critical systems offline.</p>
<p class="ember-view reader-text-block__paragraph">In the news, Microsoft issued emergency out of band Windows updates after Patch Tuesday caused shutdown and Cloud PC issues, while researchers uncovered malicious browser extensions designed to crash browsers and push fake fixes. We also discuss reports of criminals selling ready made voice phishing kits, a new EU vulnerability database launched as an alternative to CVE, and a phishing campaign targeting LastPass users with fake security alerts.</p>
<p class="ember-view reader-text-block__paragraph">We round out the episode with policy and platform updates, including the UK government consulting on banning social media for under 16s, and TikTok finalising a deal to split its US operations into a new joint venture.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle is best served in full. Watch on YouTube, or listen on Spotify or your favourite podcast platform to get the complete discussion and context.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or listen to the episode today -<span class="white-space-pre"> </span></strong><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Support the show with all new Awareness Angle merch. Stickers, notebooks, mugs, and bits that quietly say you care about people, not just passwords.</strong></p>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQHcPIpEgIaUSg/article-inline_image-shrink_1500_2232/B4EZvz9hLGJAAU-/0/1769324550119?e=1770854400&amp;v=beta&amp;t=rZxSSQ429Mr_rPBglEg55koLXfcnGRPdJ-GcawYKSpU" onerror="this.style.display='none'"></span>Just some of the stuff you can buy!</p>
<h2 class="ember-view reader-text-block__heading-2">This week's stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Voice phishing kits sold as a service</h3>
<p class="ember-view reader-text-block__paragraph"><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1105" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.theregister.com/2026/01/22/crims_sell_voice_phishing_kits/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Cybercriminals are now selling ready made voice phishing kits that let almost anyone run convincing phone scams. These kits bundle scripts, call flows, dashboards, and in some cases AI generated voices that sound like banks or internal IT teams. This is not someone freelancing a scam call. This is packaged, repeatable, and designed to scale.</p>
<p class="ember-view reader-text-block__paragraph">The kits guide attackers through the entire interaction. Who to call. What to say. When to apply pressure. Victims are coached into handing over credentials, one time passcodes, or approving actions that lead to account access. It is phishing, just delivered over the phone instead of email.</p>
<p class="ember-view reader-text-block__paragraph">The problem is that phone calls still get a free pass. Many organisations have trained people to be cautious with links and emails, but far fewer have clear rules for handling unexpected calls. Attackers are leaning into that gap hard.</p>
<p class="ember-view reader-text-block__paragraph">This is social engineering getting easier and more normal. And it is aimed squarely at busy humans.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Vishing is now off the shelf</strong><span class="white-space-pre"> </span>– Anyone can buy the tooling</li>
<li>
<strong>Calls still bypass suspicion</strong><span class="white-space-pre"> </span>– The channel carries trust</li>
<li>
<strong>Call back breaks the scam</strong><span class="white-space-pre"> </span>– Verification beats confidence</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">CrashFix browser attacks push fake fixes</h3>
<p class="ember-view reader-text-block__paragraph"><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1355" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.securityweek.com/malicious-chrome-extension-crashes-browser-in-clickfix-variant-crashfix/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">CrashFix is a browser based attack where a malicious extension deliberately crashes the browser, then tells the user they need to install a fix. That fix is malware. Nothing is broken. The crash is the whole point.</p>
<p class="ember-view reader-text-block__paragraph">After the browser fails, users are shown clear, step by step instructions telling them what to do next. Run this. Install that. It works because this is exactly how people normally deal with software problems. Get it working and carry on.</p>
<p class="ember-view reader-text-block__paragraph">This is not a clever technical exploit. It is frustration as a delivery mechanism. When something breaks, people stop thinking about risk and start thinking about recovery. CrashFix is designed to catch people in that moment.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>The crash is intentional</strong><span class="white-space-pre"> </span>– Failure is the lure</li>
<li>
<strong>Fixing mode bypasses caution</strong><span class="white-space-pre"> </span>– Urgency beats scepticism</li>
<li>
<strong>Running commands is a red flag</strong><span class="white-space-pre"> </span>– Pause before you actWatch | Read</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">UK secondary school forced to close after cyber attack</h3>
<p class="ember-view reader-text-block__paragraph"><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=676" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.theregister.com/2026/01/19/higham_lane_school_reopens/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A secondary school in England was forced to close after a cyber attack took out its IT systems. There was no big data breach story and no suggestion that grades were tampered with. The school closed because it could not function safely without its systems.</p>
<p class="ember-view reader-text-block__paragraph">Security, made human.Too much failed at once. Attendance, communications, access control, and safety related systems were all affected. That only happens when everything is tied together. Systems that should be dull, isolated, and resilient were clearly part of the same environment, so when one thing went down, everything followed.</p>
<p class="ember-view reader-text-block__paragraph">This is what happens when convenience drives design. Things get connected because it is easier, cheaper, or sold as “modern”, not because it makes sense. Then something breaks, and suddenly the impact is far bigger than anyone expected.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Not everything should be connected</strong><span class="white-space-pre"> </span>– Convenience quietly increases risk</li>
<li>
<strong>Availability is a safety issue</strong><span class="white-space-pre"> </span>– Offline systems force closure</li>
<li>
<strong>Design decisions matter</strong><span class="white-space-pre"> </span>– Architecture shapes impact</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">This week's discussion points...</h3>
<p class="ember-view reader-text-block__paragraph"><strong>Ingram Micro ransomware attack knocks global IT supply chain offline</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=85" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.theregister.com/2026/01/19/ingram_micro_ransomware_affects/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Grubhub breach exposes customer, driver, and merchant data via third party support system</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=312" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.bleepingcomputer.com/news/security/grubhub-confirms-hackers-stole-data-in-recent-security-breach/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Minnesota Department of Human Services breach exposes demographic records of nearly 304,000 people</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=528" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://statescoop.com/minnesota-human-services-data-breach/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>UK secondary school forced to close after cyber attack disrupts systems</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=676" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.theregister.com/2026/01/19/higham_lane_school_reopens/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Microsoft releases emergency Windows updates after Cloud PCs fail to shut down properly</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1004" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-oob-windows-updates-to-fix-shutdown-cloud-pc-bugs/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Criminals are now selling ready made voice phishing kits</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1105" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.theregister.com/2026/01/22/crims_sell_voice_phishing_kits/?&amp;web_view=true" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Malicious Chrome extension crashes browsers to push fake “fix” in ClickFix variant</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1355" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.securityweek.com/malicious-chrome-extension-crashes-browser-in-clickfix-variant-crashfix/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>EU launches new vulnerability database as alternative to CVE</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1628" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://cybernews.com/security/eu-launches-cve-alternative-gcve-vulnerability-database/" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Phishing campaign targets LastPass users with fake security alerts</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=1847" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.darkreading.com/application-security/phishing-campaign-zeroes-lastpass-customers" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>Government consults on banning social media for under-16s in the UK</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=2095" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.bbc.co.uk/news/articles/cgm4xpyxp7lo" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>TikTok seals deal to split US app into new joint venture, keeps platform running in America</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=2376" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.bbc.co.uk/news/articles/c3edd1l328lo" target="_blank" rel="noopener">Read</a></p>
<p class="ember-view reader-text-block__paragraph"><strong>AI snowstorm videos show the current state of the internet</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://vm.tiktok.com/ZNRBqJjKF/" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span></p>
<p class="ember-view reader-text-block__paragraph"><strong>Five ways to spot AI generated accounts on social media</strong><span class="white-space-pre"> </span>–<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://vm.tiktok.com/ZNRBVsTYT/" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span></p>
<h2 class="ember-view reader-text-block__heading-2">And finally...Action Fraud becomes “Report Fraud”, but the experience still breaks trust</h2>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQEX1vU1IHExBA/article-inline_image-shrink_1000_1488/B4EZv0B3fhIEAQ-/0/1769325690478?e=1770854400&amp;v=beta&amp;t=z0Meot4HekOgbPmCzMwdlx0gq4Z2VjcoFZyGLynlcdE" onerror="this.style.display='none'"></span>Ant and Luke discuss Report Fraud's account issues</p>
<p class="ember-view reader-text-block__paragraph"><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://youtu.be/XpjyRa2W0m0?t=2834" target="_blank" rel="noopener">Watch</a></p>
<p class="ember-view reader-text-block__paragraph">The UK’s fraud reporting service has been rebranded from Action Fraud to Report Fraud. The new name is clearer and does exactly what it says. The problem is what happens next.</p>
<p class="ember-view reader-text-block__paragraph">When users try to sign in or create an account, they are redirected to a completely different domain to complete the process. For some people, antivirus tools flag that page as suspicious or phishing. That puts users in an impossible position. They are doing the right thing by reporting fraud, and the experience immediately tells them not to trust it.</p>
<p class="ember-view reader-text-block__paragraph">This is how trust gets damaged. Not by attackers, but by confusing design. People are told to be cautious about links and domains, then asked to ignore their own instincts when it really matters. Many will simply abandon the report.</p>
<p class="ember-view reader-text-block__paragraph">If we want people to report scams and cybercrime, the process has to feel safe and consistent all the way through.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Trust is fragile</strong><span class="white-space-pre"> </span>– Mixed signals stop people acting</li>
<li>
<strong>Design shapes behaviour</strong><span class="white-space-pre"> </span>– Confusion leads to drop off</li>
<li>
<strong>Security advice must align</strong><span class="white-space-pre"> </span>– We cannot teach one thing and do another</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="kBgpcyXFNpkpsySUadbrgokwcBSJFTnFWYsOyo " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
<p class="ember-view reader-text-block__paragraph">All views and opinions are our own and do not reflect those of our employers.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/200933?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/200933?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F200933%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F200933%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_199093">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/199093/watch_times"
  data-youtube-player-video-id-value="fuG0UsphrS8"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/fuG0UsphrS8/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/199093">
          Jan 19, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/199093">
            Instagram Passwords, Ransomware Claims, and AI Controls
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, we cover a busy mix of breaches, claims, and security moments that blurred the line between what happened and what people thought happened. Instagram password reset emails caused widespread confusion, ransomware groups made high-profile breach claims without releasing data, and a well-known hacking forum found itself dealing with a leak of its own.</p>
<p class="ember-view reader-text-block__paragraph">We also look at cyber incidents with real-world impact, including attacks linked to drug smuggling at major European ports and attempted intrusions targeting national energy infrastructure. On the technology side, we discuss Microsoft’s latest Patch Tuesday, growing control over AI tools on work devices, and why some organisations want clearer choices around when those tools appear.</p>
<p class="ember-view reader-text-block__paragraph">The episode also explores emerging questions about identity and trust, from reused passwords and long-lived leaked data to eye-scanning technology promoted as a way to prove you are human online.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle is best served in full. Watch on YouTube, or listen on Spotify or your favourite podcast platform to get the complete discussion and context.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or listen to the episode today -<span class="white-space-pre"> </span></strong><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<h2 class="ember-view reader-text-block__heading-2">This week's stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Instagram password reset emails and data leak claims</h3>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=410" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.techlicious.com/blog/ignore-instagram-password-reset-scam-email/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A large number of Instagram users reported receiving password reset emails they did not request. Meta confirmed it fixed an issue that allowed an external party to trigger legitimate password reset emails at scale and said there was no breach of Instagram systems. According to Meta, user accounts were not compromised, and the emails were caused by abuse of a feature rather than a hack.</p>
<p class="ember-view reader-text-block__paragraph">At the same time, security firm Malwarebytes reported that data linked to around 17.5 million Instagram accounts was being advertised online. The dataset is said to include usernames, email addresses, phone numbers, and, in some cases, physical addresses. Meta has denied any link between the password reset emails and the data, stating that it likely came from older scraping activity rather than a new Instagram breach.</p>
<p class="ember-view reader-text-block__paragraph">While there is no public evidence tying the two events together, the timing created widespread confusion. Unexpected security emails combined with reports of leaked data looked and felt like a breach to many users, regardless of the technical explanation.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Timing shapes perception</strong><span class="white-space-pre"> </span>- When alerts and leak claims land together, people assume the worst</li>
<li>
<strong>Users see impact, not root cause</strong><span class="white-space-pre"> </span>- Bug or breach matters less than how it feels</li>
<li>
<strong>Old data still circulates</strong><span class="white-space-pre"> </span>- Historic scraping can resurface and fuel new scams</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Ports hacked to support drug smuggling, hacker jailed</h3>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1195" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A hacker has been sentenced to 7 years in prison for cyberattacks that disrupted operations at the Port of Rotterdam and the Port of Antwerp. The attacks took place between 2021 and 2023 and involved unauthorised access to container logistics systems.</p>
<p class="ember-view reader-text-block__paragraph">Prosecutors said the access was used to manipulate the release and movement of shipping containers, enabling organised crime groups to collect drug shipments without detection. The case highlights how cyber access can directly enable real-world criminal activity rather than just data theft.</p>
<p class="ember-view reader-text-block__paragraph">Authorities said the sentence reflects the seriousness of targeting critical infrastructure and the wider risks posed to safety, trade, and national security.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Cyber enables physical crime</strong><span class="white-space-pre"> </span>- Access to systems can unlock real-world harm</li>
<li>
<strong>Logins are high-value targets</strong><span class="white-space-pre"> </span>- Human access often matters more than malware</li>
<li>
<strong>Impact goes beyond IT</strong><span class="white-space-pre"> </span>- Disruption affects supply chains and public safety</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Microsoft may allow Copilot to be uninstalled on managed devices</h3>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=900" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Microsoft is planning to give IT administrators the option to uninstall Copilot from managed Windows devices, rather than just hide or disable it. The change would apply to enterprise-managed devices and address concerns about control, data handling, and readiness.</p>
<p class="ember-view reader-text-block__paragraph">The move gives organisations more choice over when and how AI tools appear on work devices, particularly as teams continue to work through policies, training, and acceptable use. Copilot remains positioned as a productivity feature, but many organisations are still deciding how to introduce it safely.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Control matters</strong><span class="white-space-pre"> </span>- IT teams want clear choices, not forced rollouts</li>
<li>
<strong>AI affects behaviour</strong><span class="white-space-pre"> </span>- Tools change how people work, not just systems</li>
<li>
<strong>Readiness comes first</strong><span class="white-space-pre"> </span>- Introducing AI before guidance creates risk</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">AI is not selling, is interest waning?</h3>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1066" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.zdnet.com/article/ai-pcs-arent-selling-and-microsofts-pc-partners-are-scrambling/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Despite heavy investment in AI-powered PCs and tools, some manufacturers are reporting weaker-than-expected demand. Executives at Dell said consumers are not buying devices for AI features, and that AI-focused messaging often creates confusion rather than clarity.</p>
<p class="ember-view reader-text-block__paragraph">The comments suggest a gap between how vendors promote AI and how everyday users understand its value. While AI continues to be embedded across products, its presence alone does not appear to be driving purchasing decisions.</p>
<p class="ember-view reader-text-block__paragraph">This comes as organisations continue to balance innovation with concerns about data use, trust, and whether people actually want AI involved in their daily work.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>AI does not automatically sell</strong><span class="white-space-pre"> </span>- Features need clear, practical value</li>
<li>
<strong>Confusion slows adoption</strong><span class="white-space-pre"> </span>- Unclear benefits create hesitation</li>
<li>
<strong>Trust still matters</strong><span class="white-space-pre"> </span>- Data questions shape acceptance</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This week's discussion points...</h2>
<p class="ember-view reader-text-block__paragraph">Everest Ransomware Claims Nissan Data Breach –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=58" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://hackread.com/everest-ransomware-nissan-data-breach/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Spanish Energy Giant Endesa Reports Major Customer Data Breach –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=222" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.securityweek.com/spanish-energy-company-endesa-hacked/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Instagram Password Reset Emails –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=410" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.techlicious.com/blog/ignore-instagram-password-reset-scam-email/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Breachforums Data Leak –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=623" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Microsoft Patch Tuesday –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=770" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://cyberscoop.com/microsoft-patch-tuesday-january-2026/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Microsoft Copilot Removal Option –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=900" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">AI PCs Not Selling –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1066" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.zdnet.com/article/ai-pcs-arent-selling-and-microsofts-pc-partners-are-scrambling/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Hacker Jailed for Attacks on Rotterdam and Antwerp Ports –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1195" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Poland Cyber Attack on Energy Infrastructure Stopped –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1350" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.euronews.com/2026/01/15/polands-pm-praises-cyber-defences-after-attempted-attack-on-energy-infrastructure-foiled" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Scam Email Knows My Password –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1444" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.reddit.com/r/phishing/s/lcA2L24Ccy" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Worldcoin and Eye Scans for Human Verification –<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1600" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.forbes.com/sites/danfitzpatrick/2025/05/19/i-let-sam-altmans-orb-scan-my-eyes-now-im-a-verified-human/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">And finally...Scanning your eyes to prove you are human, Sam Altman’s Orb</h3>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://youtu.be/fuG0UsphrS8?t=1600" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.forbes.com/sites/danfitzpatrick/2025/05/19/i-let-sam-altmans-orb-scan-my-eyes-now-im-a-verified-human/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">This one is proper Black Mirror territory, because it takes a real problem, bot spam, fake accounts, AI-generated nonsense everywhere, and answers it with something that feels way too permanent. Worldcoin’s Orb scans your iris to create a unique digital identifier, a World ID, basically a way to prove you are a real human online. In some places, they even pay you in crypto to do it.</p>
<p class="ember-view reader-text-block__paragraph">The pitch is “we do not store your eye images, we just turn it into a cryptographic code”, but the bit that makes my skin crawl is the direction of travel. Once you normalise scanning bodies to access digital services, it is hard to un-invent that. Passwords can be changed, devices can be replaced, but biometrics are forever. If a system like this ever gets abused, breached, repurposed, or linked up with other data sources, you do not get to rotate your eyeballs and start again.</p>
<p class="ember-view reader-text-block__paragraph">And the crypto incentive matters. Paying people to hand over biometric data is not neutral as it changes the deal. It nudges adoption through cash, not through genuine understanding or informed consent. And if the goal is to build trust online, starting with “here is some money, let a shiny sphere scan your iris” is a weird way to do it.</p>
<p class="ember-view reader-text-block__paragraph">This story is not just about one gadget in a shopping centre. It is about what comes next. If “prove you are human” becomes a standard requirement, who controls that proof, who decides when it is needed, and who gets locked out if they do not want to play along?</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Biometrics are permanent</strong><span class="white-space-pre"> </span>- If something goes wrong, you cannot reset it like a password</li>
<li>
<strong>Incentives change consent</strong><span class="white-space-pre"> </span>- Paying people to sign up shifts behaviour faster than understanding</li>
<li>
<strong>This will not stay niche</strong><span class="white-space-pre"> </span>- If it works once, it will get pushed into more places</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="aKgoauviAZxJAadjRGfyvORexGDtmbTuwaEng " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
<p class="ember-view reader-text-block__paragraph">All views and opinions are our own and do not reflect those of our employers.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/199093?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/199093?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F199093%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F199093%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_197210">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/197210/watch_times"
  data-youtube-player-video-id-value="edRdK5HrKlw"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/edRdK5HrKlw/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/197210">
          Jan 12, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/197210">
            Subscriber Data Exposed and Hotels ClickFix Phished
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, it is a reminder of just how much data follows us around, and how often it ends up exposed in places we barely think about. From magazine subscriptions and radio stations holding millions of records, to healthcare providers, gas stations, and even space agencies dealing with serious breaches, the theme this week is scale, and how quickly it can spiral.</p>
<p class="ember-view reader-text-block__paragraph">We look at incidents that were first reported as small, only to grow into hundreds of thousands or millions of affected people months later. We also dig into the way modern attacks blend into normal work, fake blue screens, booking emails, sideloaded apps, and even trusted security tools being used as a way in.</p>
<p class="ember-view reader-text-block__paragraph">There is a longer view, too, with Equifax still discussing culture years after its breach, new government cyber plans taking shape, and insurers quietly spelling out what they will not cover when cyber incidents spill into the physical world.</p>
<p class="ember-view reader-text-block__paragraph">It is a packed episode, full of practical lessons and uncomfortable reminders about trust, habit, and the digital footprints we all leave behind.</p>
<h2 class="ember-view reader-text-block__heading-2">This week's stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Condé Nast breach and the risk hiding in forgotten subscriptions</h3>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=82" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.pymnts.com/news/security-and-risk/2025/conde-nast-hack-exposes-40-million-users-data/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Condé Nast is responding to a breach claim that could affect up to 40 million users across brands, including Vogue, GQ, Wired, and The New Yorker. An attacker using the name “Lovely” shared data samples allegedly taken from subscription systems and claimed to have access across multiple Condé Nast properties. The exposed information reportedly includes names, email addresses, usernames, phone numbers, dates of birth, and location data. According to reports, the attacker alleged they attempted to flag vulnerabilities before releasing proof, though Condé Nast disputes parts of that account and says it has taken steps to disable the accounts involved in the unlawful access.</p>
<p class="ember-view reader-text-block__paragraph">During the discussion on the show, the focus was less on the headline number and more on how ordinary this type of data feels. Subscription accounts like these are often created years earlier and then forgotten entirely. They don’t feel sensitive or important, yet the data persists long after interest fades. That long lived, low attention data is what makes incidents like this so uncomfortable, it surfaces quietly and is easy to abuse without ever feeling like a major breach at the time.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Subscription data is still valuable</strong><span class="white-space-pre"> </span>- names and email addresses alone can fuel phishing and scams</li>
<li>
<strong>Forgotten accounts create blind spots</strong><span class="white-space-pre"> </span>- users move on while data remains</li>
<li>
<strong>Proof leaks are rarely the end</strong><span class="white-space-pre"> </span>- small samples often point to wider exposure</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">European Space Agency breach shows even critical organisations aren’t immune</h3>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=751" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.theregister.com/2026/01/07/european_space_agency_breach_criminal_probe/?utm_source=tldrinfosec" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">The European Space Agency confirmed a cyber incident that is now under criminal investigation, after attackers gained unauthorised access to parts of its internal IT environment. Reporting suggests a public vulnerability was exploited, with attackers claiming to have taken hundreds of gigabytes of internal files. ESA said mission-critical spacecraft operations were not affected, but the incident was serious enough to involve law enforcement and trigger a wider forensic review.</p>
<p class="ember-view reader-text-block__paragraph">The discussion wasn’t really about whether ESA<span class="white-space-pre"> </span><em>should</em><span class="white-space-pre"> </span>be better protected, it was more about frustration. There was a sense that some things just shouldn’t be messed with at all. Space, like healthcare or charities, doesn’t feel like a fair game. But that feeling clashes with reality. Attackers don’t draw ethical lines. If a vulnerability exists and remains open, it becomes an opportunity, regardless of how harmless or important the organisation feels.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Attackers don’t respect boundaries</strong><span class="white-space-pre"> </span>- ethical lines don’t factor into targeting decisions</li>
<li>
<strong>Unpatched weaknesses still get exploited</strong><span class="white-space-pre"> </span>- it only takes one open door</li>
<li>
<strong>Sensitive data isn’t limited to operations</strong><span class="white-space-pre"> </span>- internal documents and partner information still carry risk</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Fake blue screens are being used to trick hotel staff into installing malware</h3>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=1372" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.theregister.com/2026/01/06/russia_hackers_hotel_bsods/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Hotels across Europe are being targeted by phishing emails that impersonate booking-related messages, often posing as reservation updates or cancellations. The emails lead staff to malicious pages that display a fake Windows blue screen and instruct users to follow recovery steps. Those steps involve running commands that install malware directly onto the system. It is a ClickFix-style attack, but disguised as a system failure rather than a security warning.</p>
<p class="ember-view reader-text-block__paragraph">The conversation focused on how easy this is to fall into when it lands in the middle of a normal working day. Hotel staff deal with booking emails constantly, and fixing problems quickly is part of the job. When something looks technical and urgent, the instinct is to resolve it and move on, not stop and question whether it should be escalated. That pressure, combined with something that looks familiar, is what makes this technique effective.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Urgency drives behaviour</strong><span class="white-space-pre"> </span>- fake system errors push people into fast decisions</li>
<li>
<strong>Normal workflows lower scepticism</strong><span class="white-space-pre"> </span>- familiar-looking emails get less scrutiny</li>
<li>
<strong>ClickFix keeps evolving</strong><span class="white-space-pre"> </span>- attackers rely on users to run the malware for them</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">ChatGPT Health raises the stakes for account security</h3>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=2272" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.cnbc.com/2026/01/07/openai-chatgpt-health-medical-records.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">OpenAI announced ChatGPT Health, a feature that allows users to connect medical records and wellness apps to their ChatGPT account. The company says the feature is not intended for diagnosis or treatment, and that connected health data won’t be used to train models. The goal, according to OpenAI, is to make responses more useful by grounding them in a user’s own health context.</p>
<p class="ember-view reader-text-block__paragraph">The discussion wasn’t really about whether this is a good or bad feature, it was about concentration of value. On the show, the point was made that for many people ChatGPT is already a second brain. It holds questions, ideas, work context, and personal thinking. Adding health data into that mix means a single account can now represent a very complete picture of someone. That makes the impact of account compromise much higher than it used to be, even if the feature itself is well intentioned.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Accounts are becoming life hubs</strong><span class="white-space-pre"> </span>- more context means higher impact if compromised</li>
<li>
<strong>Login security matters more than ever</strong><span class="white-space-pre"> </span>- strong MFA and recovery controls are critical</li>
<li>
<strong>Convenience quietly expands risk</strong><span class="white-space-pre"> </span>- connecting data should always be a conscious choice</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This Week's Discussion Points...</h2>
<p class="ember-view reader-text-block__paragraph">Condé Nast breach claims and subscriber data risk –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=82" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.pymnts.com/news/security-and-risk/2025/conde-nast-hack-exposes-40-million-users-data/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Covenant Health breach grows to nearly half a million people –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=281" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.securityweek.com/covenant-health-data-breach-impacts-478000-individuals/?utm_source=tldrinfosec" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Tokyo FM breach highlights how radio stations hold vast listener data –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=438" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://hackread.com/tokyo-fm-data-breach-hacker-3-million-records-stolen/?utm_source=tldrinfosec" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">US gas station operator breach exposes payment cards and ID data after delayed notification –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=613" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://hackread.com/data-breach-us-gas-stations-company/?utm_source=tldrinfosec" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">European Space Agency breach placed under criminal investigation –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=751" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.theregister.com/2026/01/07/european_space_agency_breach_criminal_probe/?utm_source=tldrinfosec" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Equifax says security culture is now built in, after one of the biggest breaches on record –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=1063" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.csoonline.com/article/4109026/javier-checa-equifax-now-the-security-culture-is-part-of-our-dna-as-a-company.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Fake Blue Screen of Death attacks targeting hotel staff –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=1372" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.theregister.com/2026/01/06/russia_hackers_hotel_bsods/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">HSBC blocks customers using sideloaded Bitwarden apps –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=2089" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.theregister.com/2026/01/07/hsbc_bitwarden_sideloaded/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">OpenAI launches ChatGPT Health and raises questions about account value –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=2272" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.cnbc.com/2026/01/07/openai-chatgpt-health-medical-records.html" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">UK government publishes new cyber action plan –<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=2523" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.gov.uk/government/publications/government-cyber-action-plan/government-cyber-action-plan" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h2 class="ember-view reader-text-block__heading-2">And Finally...Cybersecurity Training That Ticks Boxes but Changes Nothing</h2>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQEigM2r9d6-dA/article-inline_image-shrink_1000_1488/B4EZupcJIvLwAQ-/0/1768074288245?e=1769644800&amp;v=beta&amp;t=I-aFl70QLn4j8zs_EU11t2PhBDk8mmIat1aWMXcQCG0" onerror="this.style.display='none'"></span>We discussed NCSC's training for Schools.</p>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://youtu.be/edRdK5HrKlw?t=2680" target="_blank" rel="noopener">Watch</a></p>
<p class="ember-view reader-text-block__paragraph">This week we talked about NCSC cybersecurity training being issued to school staff, a 36 minute video, stock slides, synthetic narration, no interaction, and no assessment. Everyone completes it, signs it off, and moves on. On paper, the risk is managed. In reality, very little of that content will be remembered when someone receives a real scam, a fake text, or a convincing phishing email. It is a familiar pattern in security awareness, training designed to satisfy a requirement rather than change behaviour. The problem is not that people do not care, it is that long, generic training delivered once a year does not reflect how threats actually show up in daily life.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Completion is not protection</strong><span class="white-space-pre"> </span>- Watching a video does not mean someone can spot a scam under pressure</li>
<li>
<strong>Relevance beats length</strong><span class="white-space-pre"> </span>- Five minutes of current, relatable examples beats 36 minutes of theory every time</li>
<li>
<strong>Engagement is the control</strong><span class="white-space-pre"> </span>- If people do not remember it, it cannot protect them<span class="white-space-pre"> </span>
</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="buxWJtzTkvojqTcWmwRQyhFcnEPZxwis " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/197210?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/197210?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F197210%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F197210%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_195383">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/195383/watch_times"
  data-youtube-player-video-id-value="oboBJxlM4Nc"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/oboBJxlM4Nc/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/195383">
          Jan 5, 2026
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/195383">
            Spotify Scraped and Google Phish Steals Microsoft Logins
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, we are back after the Christmas break and straight into two weeks’ worth of cyber news that didn't slow down just because the calendar said it should. From phishing emails abusing real Google services and browser extensions quietly infecting millions, to Ubisoft taking Rainbow Six Siege offline after attackers started banning players live (with a little bit of Shaggy), there is plenty to unpack.</p>
<p class="ember-view reader-text-block__paragraph">We look at airlines and retailers exposing customer data through supplier and access failures, including Korean Air and Coupang, where smashed laptops, rivers and forgotten access played a bigger role than sophisticated hacking. We also dig into ClickFix attacks being sold as a service, sleeper browser extensions stealing data months after install, and a British hacker who quite literally hacked his way into an Australian visa by doing things the right way.</p>
<p class="ember-view reader-text-block__paragraph">Add in Meta quietly shaping how scam ads are policed, smart hacking tools being banned from a mayoral inauguration, and a growing tension between security, perception, and trust, and a clear theme starts to emerge.</p>
<p class="ember-view reader-text-block__paragraph">All of that and more in this week’s Awareness Angle, so let’s get into it.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or Listen to the episode today -<span class="white-space-pre"> </span></strong><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<h2 class="ember-view reader-text-block__heading-2">This Week's Stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Spotify scraping shows why “just metadata” is never just metadata</h3>
<p class="ember-view reader-text-block__paragraph">Claims a couple of weeks ago suggested<span class="white-space-pre"> </span><strong>Spotify</strong><span class="white-space-pre"> </span>content was scraped at massive scale, with Anna’s Archive alleging access to metadata for around 256 million tracks and audio files for roughly 86 million songs. The archive, reported to be around 300TB in size, has been distributed via torrents. Spotify said it identified and disabled accounts involved in unlawful scraping, describing the activity as a mix of public metadata access and illicit tactics, but stopped short of confirming the full scale of what is circulating.</p>
<p class="ember-view reader-text-block__paragraph">What makes this story uncomfortable is that it doesn't look like a traditional breach. As we discussed on the show, this appears to be access working as designed, just abused at scale. It is easy to wave this away as “just metadata,” but metadata carries context. It reveals behaviour, popularity, listening patterns, and connections over time. Combined with other sources, it becomes far more revealing than most people expect. Add in the fact that torrents and unofficial archives are a common delivery mechanism for malware, and this stops being just a copyright issue.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Metadata is not harmless</strong><span class="white-space-pre"> </span>– Even without names or passwords, metadata can expose behaviour, habits, and patterns when collected at scale or combined with other data sources</li>
<li>
<strong>Abuse accelerates quietly</strong><span class="white-space-pre"> </span>– When automated access or credentials work once, they can be reused rapidly, turning small gaps into mass scraping before anyone notices</li>
<li>
<strong>Trust the file, not the story</strong><span class="white-space-pre"> </span>– Archives framed as preservation or culture can still be high risk, unofficial downloads are a common place for malicious content to hide</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">The browser extensions you forgot about might be the riskiest thing you use</h3>
<p class="ember-view reader-text-block__paragraph">Security researchers recently uncovered a long running campaign that saw malicious browser extensions infect<span class="white-space-pre"> </span><strong>millions of users across Chrome, Edge, and Firefox</strong>, often without raising any suspicion. The activity, linked to a threat cluster dubbed DarkSpectre, involved extensions that appeared completely legitimate, complete with positive reviews, large install numbers, and official store badges. In some cases, these extensions sat quietly for days or weeks before activating malicious behaviour.</p>
<p class="ember-view reader-text-block__paragraph">What makes this story so unsettling is how normal it all looks. As we talked about on the show, these were not shady downloads from obscure websites. They were tools people installed to customise tabs, improve productivity, or tweak their browsing experience. Once trusted, they were largely forgotten. That trust gave attackers ongoing access to sessions, credentials, meeting data, and in some cases crypto wallets, turning the browser into a silent surveillance tool.</p>
<p class="ember-view reader-text-block__paragraph">This is a reminder that your browser is not just a window to the internet. It is part of your attack surface. Extensions run with deep privileges, often seeing everything you type, click, or view. When they turn malicious later, detection is hard and user suspicion is low, because nothing appears to change.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Awareness angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Install once does not mean safe forever</strong><span class="white-space-pre"> </span>– Extensions can change behaviour after updates, long after reviews and store checks have passed</li>
<li>
<strong>Dormant threats are deliberate</strong><span class="white-space-pre"> </span>– Waiting days or weeks before activating is a common way to evade detection and earn user trust</li>
<li>
<strong>Your browser is a security boundary</strong><span class="white-space-pre"> </span>– Extensions have access to sensitive data and sessions, making them a direct path into work and personal accounts</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Meta knew about scam ads, and people kept getting hurt anyway</h3>
<p class="ember-view reader-text-block__paragraph">A<span class="white-space-pre"> </span><strong>Reuters</strong><span class="white-space-pre"> </span>investigation a couple of weeks ago laid out something many people already suspected.<span class="white-space-pre"> </span><strong>Meta</strong>, the company behind Facebook and Instagram, knew scam ads were a problem, knew how to reduce them, and still chose to manage the situation rather than fix it properly.</p>
<p class="ember-view reader-text-block__paragraph">This is not about edge cases or clever users spotting red flags. These are the fake loan offers, investment scams, and impersonation ads that show up while people are tired, stressed, or just scrolling. Reuters reported that Meta was aware stronger advertiser checks would cut scams, but held back because of cost and potential impact on ad revenue. In other words, the scams kept running, and real people kept paying the price.</p>
<p class="ember-view reader-text-block__paragraph">As we said on the show, this is where the blame needs to move. When the same scams appear again and again, it stops being a question of awareness or education. If a platform knows what works and delays using it, that is a choice. And when that choice leads to people losing money, confidence, or trust, it is not on the user to be more careful, it is on the platform to do better.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Awareness angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>People are not failing here</strong><span class="white-space-pre"> </span>– When scams keep appearing, the problem is not judgement, it is enforcement</li>
<li>
<strong>Meta had options</strong><span class="white-space-pre"> </span>– Stronger checks would have reduced harm, and choosing not to use them has consequences</li>
<li>
<strong>Scams are a design issue</strong><span class="white-space-pre"> </span>– What platforms allow, tolerate, or profit from shapes who gets hurt</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This week's discussion points...</h2>
<p class="ember-view reader-text-block__paragraph">Anna’s Archive claims massive Spotify scrape, raising questions about data access and abuse –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=76" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.androidauthority.com/spotify-annas-archive-3627023/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Android Authority)</p>
<p class="ember-view reader-text-block__paragraph">Rainbow Six Siege hit by major hack, Ubisoft takes servers offline after chaos in game economy and bans –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=325" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.tomshardware.com/video-games/pc-gaming/rainbow-six-siege-x-servers-are-back-online-after-a-hack-completely-shut-down-the-game-ubisoft-rolling-back-free-ultra-rare-skins-and-billions-of-credits" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Tom’s Hardware)</p>
<p class="ember-view reader-text-block__paragraph">Korean Air discloses passenger data exposure after supplier cyberattack –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=632" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://securityaffairs.com/186275/data-breach/korean-air-discloses-data-breach-after-the-hack-of-its-catering-and-duty-free-supplier.html?web_view=true" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Security Affairs)</p>
<p class="ember-view reader-text-block__paragraph">Coupang breach uncovered after smashed laptop data recovered by investigators –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=779" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://therecord.media/coupang-recovers-smashed-laptop-data-breach" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(The Record)</p>
<p class="ember-view reader-text-block__paragraph">Phishing campaign abuses real Google services to look legit, then steals Microsoft logins –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=953" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.techradar.com/pro/security/yet-another-phishing-campaign-impersonates-trusted-google-services-heres-what-we-know" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(TechRadar)</p>
<p class="ember-view reader-text-block__paragraph">British hacker wins Australian visa after legally hacking government website –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=1247" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://cybernews.com/security/hacker-australia-visa/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Cyber News)</p>
<p class="ember-view reader-text-block__paragraph">ErrTraffic sells “fake browser glitch” pages to push ClickFix attacks –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=1440" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.bleepingcomputer.com/news/security/new-errtraffic-service-enables-clickfix-attacks-via-fake-browser-glitches/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<p class="ember-view reader-text-block__paragraph">DarkSpectre browser extension malware infected 8.8 million users across Chrome, Edge and Firefox –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=1700" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://cybersecuritynews.com/darkspectre-hackers-infected-8-8-million-chrome-users/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Cybersecurity News)</p>
<p class="ember-view reader-text-block__paragraph">Meta built “playbook” to delay crackdowns on scam ads, internal documents reveal –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=2530" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.reuters.com/investigations/meta-created-playbook-fend-off-pressure-crack-down-scammers-documents-show-2025-12-31/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(Reuters)</p>
<p class="ember-view reader-text-block__paragraph">NYC mayoral inauguration bans Flipper Zero and Raspberry Pi devices over security fears –<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.youtube.com/watch?v=oboBJxlM4Nc&amp;t=2068" target="_blank" rel="noopener">Watch</a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.bleepingcomputer.com/news/security/nyc-mayoral-inauguration-bans-flipper-zero-raspberry-pi-devices/" target="_blank" rel="noopener">Read</a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<h3 class="ember-view reader-text-block__heading-3">And Finally...When AI Jailbreaks Get Pushed Underground</h3>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQE6O2BTA0N0mw/article-inline_image-shrink_1000_1488/B4EZuCpgoLJwAQ-/0/1767423478743?e=1769040000&amp;v=beta&amp;t=NnHW9-pLEETvezReDpPfl-bBqn_Yy3JdPtTmNi18_i0" onerror="this.style.display='none'"></span>A subreddit used by researchers gets closed down</p>
<p class="ember-view reader-text-block__paragraph">A subreddit focused on ChatGPT jailbreaks has been shut down, and on the surface that sounds like a win. Fewer prompts being shared, less obvious misuse, and fewer screenshots doing the rounds.</p>
<p class="ember-view reader-text-block__paragraph">But that space was doing more than showing people how to break things. It was one of the few places where you could see what people were actually trying in the wild. What worked. What failed. What guardrails were being walked straight around. By removing it from Reddit, the behaviour has not stopped, it has just moved somewhere quieter.</p>
<p class="ember-view reader-text-block__paragraph">This is the awkward bit. A lot of security learning comes from watching real behaviour, not ideal behaviour. Taking away visibility does not suddenly make AI safer, it just makes the problems easier to ignore. The jailbreaks will still exist, fewer defenders will see them.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Awareness angles</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>You cannot fix what you cannot see</strong><span class="white-space-pre"> </span>– Removing public discussion hides problems, it does not remove them</li>
<li>
<strong>People will keep pushing systems</strong><span class="white-space-pre"> </span>– Curiosity and misuse do not disappear just because a platform closes a space</li>
<li>
<strong>Visibility beats comfort</strong><span class="white-space-pre"> </span>– Seeing how things break is uncomfortable, but it is how security actually improves</li>
</ul>
<p></p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="qnYTlArzYtboRwdjbntMpxxVLYbykXIogw " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/195383?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/195383?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F195383%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F195383%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_192568">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/192568/watch_times"
  data-youtube-player-video-id-value="lWZGOf0NpA8"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/lWZGOf0NpA8/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/192568">
          Dec 22, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/192568">
            Microsoft Account Hacks, WhatsApp Ghost Pairing, and Extensions Spy On AI |#taa #EP67
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<p class="ember-view reader-text-block__paragraph">This week on The Awareness Angle, Luke is back, and we have a lot to get through together. We are talking about a real estate firm quietly exposing tens of thousands of people, SoundCloud losing control of user data while breaking its own VPN access, and Pornhub dealing with extortion after deeply personal viewing history leaked via a third-party analytics mess.</p>
<p class="ember-view reader-text-block__paragraph">We also look at malware hiding inside movie subtitles, browser extensions harvesting millions of AI chats in plain sight, and a new Microsoft account takeover technique that bypasses passwords, MFA, and passkeys without dropping malware. Add in WhatsApp account hijacking through ghost pairing, a UK government hack still being downplayed, and smart TVs quietly shaping what we can and cannot do in our own homes, and there is a clear theme running through this week.</p>
<p class="ember-view reader-text-block__paragraph">All of that and more in this week’s Awareness Angle, so let’s get straight into it.</p>
<p class="ember-view reader-text-block__paragraph"><strong>Watch or Listen to the episode today -<span class="white-space-pre"> </span></strong><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener"><strong>YouTube</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1MzU4ODA2NTYsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiIzYjYwM2QwOGUwYjk3MGM5In0" target="_blank" rel="noopener"><strong>Spotify</strong></a><strong><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span></strong><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://dzxlpg.clicks.mlsend.com/tf/c/eyJ2Ijoie1wiYVwiOjc2OTY5NixcImxcIjoxNDc4Mjk5NDk1NDExMjM1MzcsXCJyXCI6MTQ3ODI5OTg5MDk5NzAxNzAwfSIsInMiOiJkMDg0MjdhODRhMTkzMzYzIn0" target="_blank" rel="noopener"><strong>Apple Podcasts</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Visit<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="http://riskycreative.com/" target="_blank" rel="noopener"><strong>riskycreative.com</strong></a><span class="white-space-pre"> </span>for past episodes, our blog, and our merch.</p>
<h2 class="ember-view reader-text-block__heading-2">The Week's Stories...</h2>
<h3 class="ember-view reader-text-block__heading-3">Browser extensions secretly harvesting AI chats<span class="white-space-pre"> </span>
</h3>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQFB7r2EPZW0Dg/article-inline_image-shrink_1500_2232/B4EZtAbCHeJwAU-/0/1766312387840?e=1767830400&amp;v=beta&amp;t=gtOPssRfKRrzUbG5GUnvx785fzG5Am6Y8_rZ-EMdzX8" onerror="this.style.display='none'"></span>Image source - KOI Security, via The Hacker News</p>
<p class="ember-view reader-text-block__paragraph"><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=1727" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://thehackernews.com/2025/12/featured-chrome-browser-extension.html?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A Chrome browser extension with millions of users and a trusted Featured badge was found silently intercepting AI conversations from tools like ChatGPT, Copilot, Gemini, and others. Prompts, responses, timestamps, and session data were routed back to the developer and shared with an affiliated analytics firm. The behaviour was introduced through an update and documented quietly in a privacy policy, rather than being the result of a technical flaw.</p>
<p class="ember-view reader-text-block__paragraph">During the discussion, Ant summed up the risk clearly:<span class="white-space-pre"> </span><em>“If it’s free, you’re probably the product.”</em><span class="white-space-pre"> </span>AI tools are now being used for genuine work, with people pasting emails, notes, ideas, and sensitive context into them without hesitation. This story highlights how browser extensions can turn everyday behaviour into large-scale data exposure without users ever realising.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Trust signals are misleading</strong><span class="white-space-pre"> </span>– Featured badges and ratings are not security guarantees</li>
<li>
<strong>AI prompts are high-value data</strong><span class="white-space-pre"> </span>– Inputs often contain information people would never share elsewhere</li>
<li>
<strong>Extension sprawl increases exposure</strong><span class="white-space-pre"> </span>– Fewer extensions means fewer silent risks</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Microsoft accounts hijacked without passwords, MFA, or passkeys<span class="white-space-pre"> </span>
</h3>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQHl1PFyyIHj6g/article-inline_image-shrink_1000_1488/B4EZtAah.0I0AQ-/0/1766312256103?e=1767830400&amp;v=beta&amp;t=LQ74pUbka8RP5sF1Zs2KmnptMLmQGUMYX9W-xSoYIIk" onerror="this.style.display='none'"></span>Image Source - Push Security</p>
<p class="ember-view reader-text-block__paragraph"><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=1315" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://pushsecurity.com/blog/consentfix" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A new browser-based attack technique is allowing attackers to take over Microsoft accounts without stealing passwords, bypassing MFA, or deploying malware. Victims are tricked into copying and pasting a URL that grants OAuth access to their account. Because the user is already logged in, the attacker receives a valid session token and gains access without triggering traditional alerts or controls.</p>
<p class="ember-view reader-text-block__paragraph">The attack stood out because it relies entirely on normal-looking behaviour. Everything happens inside the browser, often via compromised websites or search results, and nothing appears broken. It reflects a broader shift away from exploiting technology and towards exploiting people, where strong technical controls still depend on users recognising when something does not look right.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Consent is the weak point</strong><span class="white-space-pre"> </span>– Access can be granted, not stolen</li>
<li>
<strong>Modern controls still rely on judgement</strong><span class="white-space-pre"> </span>– MFA reduces risk but does not remove it</li>
<li>
<strong>Browser-based attacks change the game</strong><span class="white-space-pre"> </span>– Old detection assumptions no longer hold</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">WhatsApp ghost pairing enables silent account hijacks<span class="white-space-pre"> </span>
</h3>
<p><span><img class="ivm-view-attr__img--centered  reader-image-block__img evi-image lazy-image ember-view" alt="Article content" src="https://media.licdn.com/dms/image/v2/D4E12AQEzgvgvg7f0Xg/article-inline_image-shrink_1500_2232/B4EZtAauwNHMAU-/0/1766312308308?e=1767830400&amp;v=beta&amp;t=O5QWCwtp41HWgRtyo9mgymaPnZoF7Pv6V2MnvTFOQV4" onerror="this.style.display='none'"></span>Image Source - Gen Digital</p>
<p class="ember-view reader-text-block__paragraph"><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=2289" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bleepingcomputer.com/news/security/whatsapp-device-linking-abused-in-account-hijacking-attacks/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Attackers are hijacking WhatsApp accounts by abusing the platform’s built-in device linking feature. Victims are socially engineered into approving a new linked device, often through messages that appear to come from trusted contacts. Once paired, attackers can read messages in real time, impersonate the victim, and monitor conversations without disrupting normal use.</p>
<p class="ember-view reader-text-block__paragraph">As Luke noted during the episode,<span class="white-space-pre"> </span><em>“A working account is not the same thing as a secure one.”</em><span class="white-space-pre"> </span>WhatsApp is widely used for informal work conversations, leadership chats, and quick decisions outside official systems. Because there are often no visible signs of compromise, attackers can remain connected for long periods unless users actively check their linked devices.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Convenience features are attack paths</strong><span class="white-space-pre"> </span>– Normal functionality is being weaponised</li>
<li>
<strong>Compromise can be invisible</strong><span class="white-space-pre"> </span>– No alerts does not mean no attacker</li>
<li>
<strong>Routine checks reduce risk</strong><span class="white-space-pre"> </span>– Linked devices should be reviewed regularly</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This week's discussion points...<span class="white-space-pre"> </span>
</h2>
<p class="ember-view reader-text-block__paragraph">NYC and DC real estate developer notifies 47,000 people of data breach –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=96" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.comparitech.com/news/nyc-dc-real-estate-developer-notifies-47000-people-of-data-breach/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(Comparitech)</p>
<p class="ember-view reader-text-block__paragraph">SoundCloud confirms breach after member data stolen, VPN access disrupted –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=267" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<p class="ember-view reader-text-block__paragraph">PornHub extorted after hackers steal Premium member activity data –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=495" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<p class="ember-view reader-text-block__paragraph">Inquiry ongoing after UK government hacked, says minister –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=807" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bbc.co.uk/news/articles/cj4qpwprw9vo" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(BBC News)</p>
<p class="ember-view reader-text-block__paragraph">Fake “One Battle After Another” torrent hides malware in subtitles –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=1009" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bleepingcomputer.com/news/security/fake-one-battle-after-another-torrent-hides-malware-in-subtitles/" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<p class="ember-view reader-text-block__paragraph">Microsoft account takeover alerts surge as attackers test logins at scale –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=1315" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://pushsecurity.com/blog/consentfix" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(Push Security)</p>
<p class="ember-view reader-text-block__paragraph">Featured Chrome browser extension caught intercepting millions of users’ AI chats –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=1727" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://thehackernews.com/2025/12/featured-chrome-browser-extension.html?&amp;web_view=true" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(The Hacker News)</p>
<p class="ember-view reader-text-block__paragraph">LG backtracks on Copilot web app deletion after user backlash –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=2094" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.theverge.com/news/847685/lg-copilot-web-app-delete" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(The Verge)</p>
<p class="ember-view reader-text-block__paragraph">Ghost Pairing, WhatsApp account hijack technique –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=2289" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.bleepingcomputer.com/news/security/whatsapp-device-linking-abused-in-account-hijacking-attacks/" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(BleepingComputer)</p>
<p class="ember-view reader-text-block__paragraph">North Korean infiltrator caught working in Amazon IT department via keystroke lag –<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=3452" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.reddit.com/r/technology/s/yvvOBY7D23" target="_blank" rel="noopener"><strong>Read</strong></a><span class="white-space-pre"> </span>(Reddit)</p>
<h3 class="ember-view reader-text-block__heading-3">And Finally...The Amazon Insider Caught by 110 Milliseconds</h3>
<p class="ember-view reader-text-block__paragraph"><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://youtu.be/lWZGOf0NpA8?t=3452" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.reddit.com/r/technology/s/yvvOBY7D23" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">A North Korean infiltrator worked inside Amazon’s IT function, and the thing that gave them away was not malware, phishing, or suspicious logins.</p>
<p class="ember-view reader-text-block__paragraph">It was typing.</p>
<p class="ember-view reader-text-block__paragraph">Security teams noticed a consistent 110 millisecond delay between keystrokes. Tiny. Almost imperceptible. But enough to raise questions. The laptop was physically in the US. The person typing was not. The machine was being remotely controlled from North Korea, using legitimate access, doing legitimate work, until behaviour gave them away.</p>
<p class="ember-view reader-text-block__paragraph">This is what modern insider risk looks like. No broken controls. No alarms. Valid credentials, authorised access, and activity that looked normal on the surface. The risk only surfaced because someone was paying attention to behavioural patterns rather than waiting for alerts.</p>
<p class="ember-view reader-text-block__paragraph">It also raises an uncomfortable question about awareness. Behavioural signals can protect organisations, but they sit close to the line between monitoring and spying. In this case, it stopped a state-sponsored infiltration. In another, the same techniques could feel intrusive or excessive. Awareness is not just about spotting attackers, it is about understanding how security decisions affect people, trust, and culture.</p>
<p class="ember-view reader-text-block__paragraph">Thanks for reading! If you’ve spotted something interesting in the world of cyber this week, a breach, a tool, or just something a bit weird, let us know at<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="mailto:hello@riskycreative.com" target="_blank" rel="noopener"><strong>hello@riskycreative.com</strong></a>. We’re always learning, and your input helps shape future episodes.</p>
<p class="ember-view reader-text-block__paragraph"><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.linkedin.com/in/infosecant/" target="_blank" rel="noopener"><strong>Ant Davis</strong></a><span class="white-space-pre"> </span>and<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.linkedin.com/in/lukejpme/" target="_blank" rel="noopener"><strong>Luke Pettigrew</strong></a><span class="white-space-pre"> </span>write this newsletter and podcast.</p>
<p class="ember-view reader-text-block__paragraph">The Awareness Angle Podcast and Newsletter is a<span class="white-space-pre"> </span><a class="ZQhwTcMUGTmwKWLrBYxTHXTSORxzFEcxkPKQ " href="https://www.linkedin.com/company/riskycreative/" target="_blank" rel="noopener"><strong>Risky Creative</strong></a><span class="white-space-pre"> </span>production.</p>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/192568?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/192568?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F192568%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F192568%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_190876">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/190876/watch_times"
  data-youtube-player-video-id-value="QsoH3G7GfU0"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/QsoH3G7GfU0/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/190876">
          Dec 15, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/190876">
            <span class="emoji">🎙️</span> In This Week’s Episode – <span class="emoji">💥</span> Data breaches everywhere, <span class="emoji">📺</span> LG TVs force Copilot, <span class="emoji">🧑‍💼</span> Insider access failures
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<h1>LG Copilot Update, Widespread Data Breaches, and Travel Privacy Fears</h1>
<p><strong></strong><strong>Hi, it's Ant! </strong></p>
<p>This week on The Awareness Angle, I am on my own, and there is a lot to get through. Data breaches are everywhere, from forgotten accounts and simple misconfigurations to ransomware hitting pharma firms and exposing sensitive data. I look at how software updates are being abused to push malware, why Apple has rushed out fixes for active zero-days, and what it means when governments start accusing each other of cyber attacks on critical infrastructure.</p>
<p>I also dig into LG quietly pushing Microsoft Copilot onto smart TVs without a clear opt-out, raising some big questions about privacy and control in our own homes. And finally, there is a proposal in the US that could see travellers handing over years of social media just to get through the border.</p>
<p>All of that and more in this week’s Awareness Angle. It is just me this time as Luke's on his holidays, so let’s get straight into it.</p>
<p><br><span> </span>Listen on your favourite podcast platform - <a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6?si=fdfa4d2fe0d4403c" target="_blank" rel="noopener">Spotify,</a><span> </span><a href="https://podcasts.apple.com/gb/podcast/the-awareness-angle/id1784126196" target="_blank" rel="noopener">Apple Podcasts</a><span> </span>and<span> </span><a href="https://www.youtube.com/playlist?list=PLEsOj51Q0PfA0qX6BRlNnyD7lG8JlijRf" target="_blank" rel="noopener">YouTube</a></p>





























<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_-4231199220004915668img CToWUd" height="150" src="https://ci3.googleusercontent.com/meips/ADKq_NYyJ897MxEIKYezSqSnlim4ZNM6N3bUZ7fupyC71dU_GWTIgfoWQuFTs1PKx3VZHtq-YtoX2BiRrAV8tdGEVnLCCeYIxR6dRj_PcffgQEIBCqsCFeWYwBN34Wngpj9Ak-OBfHrs0Nym7JwPhGGjjysS=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/sUoDecU44zz9KmMsr60hR8bNOrdlgpgPvFbnGFmO.png" width="150" onerror="this.style.display='none'"></span></a>


<h2><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Listen Now</a></h2>
<span><a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener">Podcast · Risky Creative</a></span>

<a href="https://open.spotify.com/show/7rwzcRsKrXbASFBfiXoCZ6" target="_blank" rel="noopener"><span><img class="m_-4231199220004915668img CToWUd" height="48" src="https://ci3.googleusercontent.com/meips/ADKq_NbegVyQ56xtGMctwI74KZUXXlu4FCa4ZVpt9mf_dVpie72SAytX5gzqQ1cyHC0WMueAFjuViZ6rNbTU8wFPNkZ52dXkruu8oml5nlLsSYow0A=s0-d-e1-ft#https://assets.mlcdn.com/ml/images/video/play_btn_green.png" width="48" onerror="this.style.display='none'"></span></a>




































<h2>This week's stories...</h2>
<h3>LG smart TVs quietly get Microsoft Copilot</h3>
<p><a href="https://youtu.be/QsoH3G7GfU0?t=1359" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.webpronews.com/lg-update-installs-unremovable-microsoft-copilot-on-smart-tvs-ignites-backlash/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>LG has pushed Microsoft Copilot onto a range of smart TVs via a routine firmware update, installing it as a system-level feature with no obvious way to remove it. It just appears. For a lot of people, this is not about Copilot being good or bad, it is about something being added to a device in their living room without being asked.</p>
<p>What really sits underneath this is control and data. Smart TVs already collect a lot of viewing and usage information, and adding an AI assistant only raises more questions about what is being gathered and where it goes. It is the same pattern we have seen with cars, phones, and other “smart” devices, once the hardware is in your home, the software can keep changing.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Control after purchase</strong><span> </span>– Buying hardware should not mean surrendering future decisions.</li>
<li>
<strong>Data follows features</strong><span> </span>– New functionality usually comes with new data flows.</li>
<li>
<strong>Question connected defaults</strong><span> </span>– Not everything needs to be online all the time.</li>
</ul>
<p></p>
<h3>US may require travellers to hand over social media history</h3>
<p><a href="https://youtu.be/QsoH3G7GfU0?t=2980" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://vm.tiktok.com/ZNRN8K2jV/" target="_blank" rel="noopener"><strong>Read</strong></a> |<span> </span><a href="https://www.aljazeera.com/news/2025/12/12/why-is-trump-demanding-travellers-social-media-handles-how-will-it-work" target="_blank" rel="noopener">Read More</a></p>
<p>The US is proposing changes to its visa waiver process that could require travellers to provide up to five years of social media history, along with contact details and other personal information. This would apply to people travelling from countries like the UK who currently enter visa-free, often for work, conferences, or holidays.</p>
<p>I am not suggesting people have anything to hide, but it does raise an uncomfortable question about where the line sits. Online posts, likes, and opinions suddenly become part of a border decision. With major global events coming up in the US, it will be interesting to see how many people rethink travel if this goes ahead.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Privacy versus security</strong><span> </span>– Extra checks always come with trade-offs.</li>
<li>
<strong>Digital history becomes identity</strong><span> </span>– Old posts can gain new meaning at borders.</li>
<li>
<strong>Friction changes behaviour</strong><span> </span>– More intrusive processes discourage travel.</li>
</ul>
<p></p>
<h3>Millions exposed by third-party data breaches</h3>
<p><a href="https://youtu.be/QsoH3G7GfU0?t=205" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.tomsguide.com/computing/online-security/nearly-5-6-million-people-hit-by-massive-data-breach-at-credit-check-company-what-you-need-to-know" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>This week’s breaches include a credit-checking firm and a veterinary services provider, exposing millions of records through a mix of poor access control and simple misconfiguration. In many cases, the people affected never chose to trust these organisations, their data was just passed along as part of the background machinery of modern services.</p>
<p>This is why third-party risk feels so unfair at a personal level. You can be careful, you can follow advice, and you still end up dealing with the fallout because someone else made a mistake. Identity data cannot be changed, and once it is out there, it stays out there.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Invisible trust chains</strong><span> </span>– Your data moves far beyond the companies you recognise.</li>
<li>
<strong>Long tail impact</strong><span> </span>– Identity exposure lasts longer than headlines.</li>
<li>
<strong>Basic hygiene still matters</strong><span> </span>– Most damage comes from simple failures.</li>
</ul>
<p></p>
<h3>Pharma firm hit by ransomware and data theft</h3>
<p><a href="https://youtu.be/QsoH3G7GfU0?t=775" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-discloses-data-breach-after-ransomware-attack/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p>A pharmaceutical research firm has confirmed it was hit by ransomware after attackers accessed and stole data before locking systems. This is now the standard playbook. Get in, take what you can, then encrypt everything and demand payment for both silence and recovery.</p>
<p>We still talk about ransomware as if it is mainly about downtime, but the real damage is often the data loss. In sectors like pharma and healthcare, that data can be sensitive, regulated, and tied to real people. Even when systems come back, the risk does not disappear.</p>
<p><strong>The Awareness Angle</strong></p>
<ul>
<li>
<strong>Ransomware is about leverage</strong><span> </span>– Stolen data changes the pressure entirely.</li>
<li>
<strong>Backups reduce pain, not risk</strong><span> </span>– Recovery does not undo exposure.</li>
<li>
<strong>Early access is the weak point</strong><span> </span>– Phishing and stolen credentials remain common entry routes.</li>
</ul>
<ul></ul>
<ul></ul>
<ul></ul>
<ul></ul>



























































<h2>This Week's Discussion Points...</h2>
<p>Coupang breach traced to ex-employee access -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=55" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/amp/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(BleepingComputer)</p>
<p>Credit check company breach exposes millions -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=205" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.tomsguide.com/computing/online-security/nearly-5-6-million-people-hit-by-massive-data-breach-at-credit-check-company-what-you-need-to-know" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(Tom’s Guide)</p>
<p>Petco Vetco website data exposure -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=537" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://techcrunch.com/2025/12/10/petco-takes-down-vetco-website-after-exposing-customers-personal-information/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(TechCrunch)</p>
<p>Inotiv ransomware attack and data theft -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=775" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/pharma-firm-inotiv-discloses-data-breach-after-ransomware-attack/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(BleepingComputer)</p>
<p>Apple emergency zero-day updates -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=922" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(The Hacker News)</p>
<p>Notepad++ malicious update flaw -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=1120" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bleepingcomputer.com/news/security/notepad-plus-plus-fixes-flaw-that-let-attackers-push-malicious-update-files/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(BleepingComputer)</p>
<p>LG TVs install Microsoft Copilot -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=1359" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.webpronews.com/lg-update-installs-unremovable-microsoft-copilot-on-smart-tvs-ignites-backlash/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(WebProNews)</p>
<p>Germany accuses Russia of air traffic control cyber attack -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=1910" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.bbc.co.uk/news/articles/cvgrrnylzzyo" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(BBC News)</p>
<p>Pringles account breach and password reuse -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=2029" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.reddit.com/r/comedyheaven/comments/1pg8btm/pringle/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(Reddit)</p>
<p><a href="https://www.linkedin.com/in/harleysugarman?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAeW1j8BBnKeEDkKz-o3YVmsnDme5_qWj_k" target="_blank" rel="noopener">Harley Sugarman</a>'s Elsbeth TV show phishing simulation -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=2390" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://www.linkedin.com/posts/harleysugarman_were-working-hard-so-your-team-doesnt-become-activity-7404944328344829952-b0jX" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(LinkedIn)</p>
<p>US proposal to collect travellers’ social media history -<span> </span><a href="https://youtu.be/QsoH3G7GfU0?t=2980" target="_blank" rel="noopener"><strong>Watch</strong></a><span> </span>|<span> </span><a href="https://vm.tiktok.com/ZNRN8K2jV/" target="_blank" rel="noopener"><strong>Read</strong></a><span> </span>(TikTok)</p>



























































<h2>And Finally...Pringles Popped</h2>

























<span><img class="m_-4231199220004915668img CToWUd a6T" alt="" src="https://ci3.googleusercontent.com/meips/ADKq_NYOyESud7wdU_hZI0BNZOIpWWZxvN5KLwY-0L0_Bh5TnqO7v4eu79hvce-spuNvnPE7MCkRxKE10y_0o08R_cfdCnqnQYgz2KUzFh2ZHvpvTXYuxbDOBJnY8w9lu4MMSKWQ0G7SDZj2T68fT65WMBzw=s0-d-e1-ft#https://storage.mlcdn.com/account_image/769696/fTf9QurG5A0qIyq6gwE8hMyQpsFg5Sb1DrvBSJBu.png" width="540" onerror="this.style.display='none'"></span>

























<p><a href="https://youtu.be/QsoH3G7GfU0?t=2029" target="_blank" rel="noopener"><strong>Watch</strong></a></p>
<p>This week, someone shared a screenshot of a Google warning telling them their password for the Pringles website had been exposed in a data breach. And yes, that raises the obvious question: why does anyone even have a Pringles account?</p>
<p>But that is precisely the point.</p>
<p>Most of us now have hundreds of online accounts. Brand sites, loyalty schemes, competitions, things we signed up for once and never thought about again. We forget they exist, but attackers do not.</p>
<p>When one of those random accounts gets breached, it is not about crisps. It is about whether that same password works anywhere else. Email, shopping, social media, and work tools. That is where the real damage happens.</p>
<p>So laugh at the Pringles account if you want, but it is a perfect reminder that password reuse is still one of the biggest risks out there. If your brain cannot remember every account you have, it should not be trying to remember every password either.</p>
<p>That is why password managers matter, even for the silly stuff.</p>
<ul></ul>
<p></p>


























<h3>Do you have something you would like us to talk about? Are you struggling to solve a problem, or have you had an awesome success? Reply to this email telling us your story, and we might cover it in the next episode!</h3>











</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/190876?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/190876?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F190876%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F190876%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame><turbo-frame class="main-list__list-item" data-testid="Post" id="post_188646">
    <div class="post" access="public">
  <div class="post__inner">
      <div class="post__media">
        <div class="media-player media-player--video">
            <div
  class="embed-player"
  data-controller="youtube-player"
  data-youtube-player-watch-times-path-value="https://riskycreative.com/supporters/api/v1/media_catalog/posts/video_embeds/188646/watch_times"
  data-youtube-player-video-id-value="C60-A0Er09c"
>
  <div class="media-player__cover" data-youtube-player-target="element">
    <img src="https://img.youtube.com/vi/C60-A0Er09c/hqdefault.jpg" class="media-player__cover-image media-player__cover-image--cover" loading="lazy" />
    <button type="button" class="media-player__cover-button" data-action="click->youtube-player#createPlayer" data-testid="YoutubePlayer.PlayButton">
      <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" viewBox="0 0 32 32" fill="none" role="img"><path d="M28.422 14.211c1.474.737 1.474 2.84 0 3.578L2.894 30.553A2 2 0 0 1 0 28.763V3.237a2 2 0 0 1 2.894-1.789l25.528 12.764Z" fill="currentColor"></path></svg>

    </button>
  </div>
</div>

        </div>
      </div>

    <div class="post__main">
  <div class="post__content">
        <a data-turbo-frame="_top" class="post__meta" href="/supporters/video_embeds/188646">
          Dec 8, 2025
</a>

      <div>
          <a data-turbo-frame="_top" class="post__title" href="/supporters/video_embeds/188646">
            Scientology Breach, Windows Chaos and a Live ChatGPT Scam
</a>      </div>

      

        <div
          class="post__body"
            data-controller="trim"
            data-trim-class-value="rich-text--trimmed-short"
            data-trim-height-value="220"
        >
          <div class="rich-text" data-trim-target="content">
            <body>
<h3 class="ember-view reader-text-block__heading-3">Scientology hit by the Qilin ransomware gang</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=79" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://cybernews.com/entertainment/scientology-ransomware-attack-qilin-secret-files-exposed/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">The Church of Scientology has confirmed a ransomware attack after the Qilin gang claimed they stole 190 gigabytes of internal files. Samples posted online appear to include recent operational documents from its UK base. It is an unusual breach of a very private organisation, and it raises the question of what happens when a group built on secrecy loses control of its own information.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Backups protect choices</strong><span class="white-space-pre"> </span>- Good backups take the pressure out of ransom negotiations and limit long-term damage.</li>
<li>
<strong>Reputation does not reduce risk</strong><span class="white-space-pre"> </span>- Attackers care about opportunity and leverage, not public profile.</li>
<li>
<strong>Fast isolation contains fallout</strong><span class="white-space-pre"> </span>- Stopping the spread early makes the difference between a bad day and a full crisis.</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Westminster Council still struggling after last month’s attack</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=208" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://fitzrovianews.com/2025/12/04/westminster-council-cyber-attack-services-disrupted/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">Westminster Council is weeks into its recovery and still cannot process repairs, housing payments, children’s services referrals or even simple online requests. Residents are being pushed to offline workarounds while the council rebuilds systems and investigates the source of the attack. It is a clear reminder that cyber incidents do not just affect networks. They affect people and entire communities.</p>
<p class="ember-view reader-text-block__paragraph"><strong>The Awareness Angle</strong></p>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Critical services need manual fallbacks</strong><span class="white-space-pre"> </span>- When systems fail, people need clear alternative paths.</li>
<li>
<strong>Local impact is wide and immediate</strong><span class="white-space-pre"> </span>- Councils hold sensitive data and support essential services, so downtime hits real lives fast.</li>
<li>
<strong>Shared platforms multiply the damage</strong><span class="white-space-pre"> </span>- When multiple councils share systems, one breach becomes everyone’s problem.</li>
</ul>
<p></p>
<h3 class="ember-view reader-text-block__heading-3">Windows 10 becomes a 500,000,000 device security problem</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=967" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.forbes.com/sites/zakdoffman/2025/12/01/security-disaster-500-million-microsoft-users-say-no-to-windows-11/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<p class="ember-view reader-text-block__paragraph">More than five hundred million people are still on Windows 10. Support has ended, updates have stopped, and new vulnerabilities are now left open for attackers to use. This is not a user failure. This is a Microsoft-created problem. They made the upgrade path difficult. They set hardware requirements that millions of perfectly good devices cannot meet. They pushed people toward machines that need new chips and new components, even when the old ones still work.</p>
<p class="ember-view reader-text-block__paragraph">This week’s Windows LNK zero-day proves the point. A simple shortcut file could run hidden code. Windows 11 users will get a fix. Windows 10 users are on their own. When half a billion people are stuck on an unsupported system, it is not a natural result of poor user behaviour. It is the result of a forced upgrade strategy that people cannot afford, cannot justify or simply cannot complete.</p>
<p class="ember-view reader-text-block__paragraph">Microsoft says it is about progress and security. But creating a security crisis by ending support for a product that half the world still uses should not be called progress. It should be called what it is. A company decision that shifted risk from Microsoft to everyone else.</p>
<h3 class="ember-view reader-text-block__heading-3">The Awareness Angle</h3>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Unsupported devices become easy targets</strong><span class="white-space-pre"> </span>- Once a product is abandoned, every new hole stays open. Attackers know exactly where to look.</li>
<li>
<strong>Upgrade friction is a business problem, not a user flaw</strong><span class="white-space-pre"> </span>- People did not reject security. They rejected the cost and complexity of replacing hardware that still works.</li>
<li>
<strong>Lifecycle planning beats last-minute panic</strong><span class="white-space-pre"> </span>- Organisations need clear plans for device refresh long before support ends. People should never be forced into insecure choices by a vendor.</li>
</ul>
<p></p>
<h2 class="ember-view reader-text-block__heading-2">This Week's Discussion Points...</h2>
<h3 class="ember-view reader-text-block__heading-3">Scientology ransomware attack</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=79" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://cybernews.com/entertainment/scientology-ransomware-attack-qilin-secret-files-exposed/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Westminster Council still disrupted after cyber attack</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=208" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://fitzrovianews.com/2025/12/04/westminster-council-cyber-attack-services-disrupted/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Freedom Mobile breach</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=424" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.bleepingcomputer.com/news/security/freedom-mobile-discloses-data-breach-exposing-customer-data/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Brsk breach in the UK</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=548" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.theregister.com/2025/11/28/brsk_breach/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Marquis breach affecting seventy four US banks</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=698" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.bleepingcomputer.com/news/security/marquis-data-breach-impacts-over-74-us-banks-credit-unions/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Windows 10 security crisis and five hundred million unsupported devices</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=967" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.forbes.com/sites/zakdoffman/2025/12/01/security-disaster-500-million-microsoft-users-say-no-to-windows-11/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Windows LNK zero day actively exploited</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=967" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.bleepingcomputer.com/news/microsoft/microsoft-mitigates-windows-lnk-flaw-exploited-as-zero-day/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Microsoft Teams location and activity tracking concerns</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=1220" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.forbes.com/sites/zakdoffman/2025/11/30/this-is-when-microsoft-starts-telling-your-boss-if-youre-not-at-work/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">India drops plan to force cyber safety app on smartphones</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=1341" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.bbc.co.uk/news/articles/clydg2re4d1o" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Fake ChatGPT Atlas installer used in ClickFix attack</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=1551" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://hackread.com/fake-chatgpt-atlas-clickfix-steal-passwords/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">AI used to fake street footage and mislead viewers</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=2733" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.reddit.com/r/quityourbullshit/s/xuTeHJrO4l" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Employee falls for phishing but reports within minutes</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=2480" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://www.reddit.com/r/auscorp/comments/1pb219x/fell_for_a_phishing_email_and_got_hacked_will_i/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">AI generated Home Alone behind the scenes footage</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=2883" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://vm.tiktok.com/ZNRRsL9vq/" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">Japanese studio makes candidates draw live to prevent AI cheating</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=3314" target="_blank" rel="noopener"><strong>Watch</strong></a><span class="white-space-pre"> </span>|<span class="white-space-pre"> </span><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://80.lv/articles/japanese-game-studio-tasks-job-seekers-to-draw-in-front-of-them-to-make-sure-their-portfolios-aren-t-ai-made" target="_blank" rel="noopener"><strong>Read</strong></a></p>
<h3 class="ember-view reader-text-block__heading-3">The Fake ChatGPT Atlas Attack We Caught Live</h3>
<p class="ember-view reader-text-block__paragraph"><a class="QJGrFqtGqHGdfvGNjGKbMnXKKgXQAqEbI " href="https://youtu.be/C60-A0Er09c?t=1870" target="_blank" rel="noopener">Watch</a></p>
<p class="ember-view reader-text-block__paragraph">This one was wild because it unfolded in real time while we were recording. A sponsored Google search result appeared, claiming to offer a Mac install of something called “ChatGPT Atlas.” At first glance, it looked legitimate. Clean branding, a simple landing page, and a Google Sites address that many people would trust without thinking twice.</p>
<p class="ember-view reader-text-block__paragraph">But the moment you clicked the download button, the trap appeared. The page told users to open their terminal, copy a command that had already been placed on the clipboard, paste it in, and press enter. That single instruction would have handed attackers full access to the device, likely including passwords and authentication tokens. No malware file, no pop-up, just social engineering wrapped inside “tech support” style instructions. Classic ClickFix.</p>
<p class="ember-view reader-text-block__paragraph">The most alarming part came when we dug deeper. The Google ad promoting the fake installer was not placed by the attackers using their own domain. It was placed through a compromised Google Ads account belonging to a genuine charity. This gave the malicious site extra credibility because it came from a trusted advertiser with a history of clean campaign activity. It also explains why it climbed so high in search results.</p>
<p class="ember-view reader-text-block__paragraph">This is what modern attacks look like. No broken English. No dodgy popups. Just familiarity, big brand names, borrowed trust and a single "copy and paste" that does the damage.</p>
<h3 class="ember-view reader-text-block__heading-3">The Awareness Angle</h3>
<p class="ember-view reader-text-block__paragraph"></p>
<ul>
<li>
<strong>Trust is being borrowed from real brands</strong><span class="white-space-pre"> </span>- Attackers know people search for “ChatGPT app” or “ChatGPT browser” and click the first result. They do not need to fool the platform. They only need to fool the user.</li>
<li>
<strong>Terminal commands are the new phishing link</strong><span class="white-space-pre"> </span>- Tech-savvy staff are often the easiest to catch here. If you are used to running commands, you stop questioning the source.</li>
<li>
<strong>Platform trust signals are fading fast</strong><span class="white-space-pre"> </span>- Google sites, sponsored results, clean pages, even verified advertiser accounts. None of these guarantees safety anymore. The only safe rule is this. Never paste a command into your terminal unless you know exactly who wrote it.</li>
</ul>
</body>
          </div>
          <button class="text-button text-button--pale post__action-button hidden" data-action="click-&gt;trim#expand" data-trim-target="button">
    ...Continue reading
</button>
        </div>

      

        <div class="post__section">
          <div class="post-actions">
            <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
  <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
    <div class="post-actions__item">
      <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="m2.662 7.721 5.14 5.918a.25.25 0 0 0 .378 0l5.142-5.92c1.856-2.21 1.25-4.386.03-5.37-.62-.5-1.407-.711-2.203-.513-.796.197-1.712.833-2.504 2.243a.75.75 0 0 1-1.308-.001c-.794-1.416-1.708-2.054-2.5-2.253-.79-.2-1.573.01-2.19.51-1.214.983-1.822 3.167.015 5.386Zm5.33-5.375C7.172 1.274 6.212.623 5.202.37c-1.292-.325-2.552.032-3.5.8-1.913 1.55-2.524 4.702-.19 7.515l.012.013 5.146 5.925a1.75 1.75 0 0 0 2.642 0l5.146-5.925.008-.009c2.362-2.805 1.75-5.956-.171-7.507-.95-.766-2.213-1.124-3.508-.802-1.01.25-1.974.898-2.795 1.966Z" clip-rule="evenodd"></path></svg>

    </div>

</button></form>
              <form class="post-actions__item-form" data-turbo="false" action="/supporters/sign_up" accept-charset="UTF-8" method="get">
    <button class="text-button text-button--small text-button--pale" aria-label="Become a member">
    
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M1.75 2.25a.25.25 0 0 0-.25.25v8.067c0 .139.112.25.25.25H3c.967 0 1.75.784 1.75 1.75v1.21c0 .216.255.33.416.187l3.053-2.706a1.75 1.75 0 0 1 1.16-.44h4.871a.25.25 0 0 0 .25-.25V2.5a.25.25 0 0 0-.25-.25H1.75ZM0 2.5C0 1.534.784.75 1.75.75h12.5c.966 0 1.75.784 1.75 1.75v8.067a1.75 1.75 0 0 1-1.75 1.75H9.38a.25.25 0 0 0-.166.063L6.16 15.087c-1.13 1-2.911.199-2.911-1.31v-1.21a.25.25 0 0 0-.25-.25H1.75A1.75 1.75 0 0 1 0 10.567V2.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number"></span>
      </div>

</button></form>
            
<div class="dropdown" data-controller="dropdown link-share" data-dropdown-placement-value="bottom-start" data-action="link-share:unavailable-&gt;dropdown#toggle" data-link-share-url-value="https://riskycreative.com/supporters/video_embeds/188646?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter">
      <div class="comment__menu" data-dropdown-target="button" data-action="click->link-share#share">
      <div class="post-actions__item">
        <svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" fill="none" viewBox="0 0 16 16" role="img" class="post-actions__icon"><path fill="currentColor" fill-rule="evenodd" d="M6.996.471a1.41 1.41 0 0 1 2.008 0l4.943 5.013-1.068 1.053L8.75 2.35v9.121h-1.5V2.35L3.12 6.537 2.054 5.484 6.996.471ZM1.5 11.108v3.143c0 .138.111.249.249.249H14.25c.138 0 .249-.11.249-.25v-3.142H16v3.143c0 .965-.781 1.749-1.749 1.749H1.75A1.748 1.748 0 0 1 0 14.25v-3.142h1.5Z" clip-rule="evenodd"></path></svg>

        <span class="post-actions__item-number hidden@sm">Share</span>
      </div>
    </div>


  <div class="dropdown__menu hidden" data-dropdown-target="items">
    <div class="dropdown__items">
        <div class="dropdown__title">Share this post</div>

      

  <button class="dropdown__item" data-action="click-&gt;dropdown#hide" data-controller="clipboard" data-clipboard-text="https://riskycreative.com/supporters/video_embeds/188646?utm_medium=copy-share-link&amp;utm_source=share-link&amp;utm_campaign=post-share-supporter" type="button">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" fill="none" viewBox="0 0 16 16" role="img"><path fill="currentColor" fill-rule="evenodd" d="M12.145 1.5a1.762 1.762 0 0 0-1.246.516L8.234 4.681l-1.06-1.06L9.837.955a3.264 3.264 0 0 1 4.615 0l.591.591a3.264 3.264 0 0 1 0 4.613l-3.849 3.85a3.262 3.262 0 0 1-4.614 0l-.593-.592 1.062-1.06.591.592a1.763 1.763 0 0 0 2.493 0l3.85-3.85a1.762 1.762 0 0 0 0-2.492l-.592-.591a1.764 1.764 0 0 0-1.247-.517ZM7.112 6.534c-.468 0-.916.186-1.247.516L2.016 10.9a1.762 1.762 0 0 0 0 2.492m0 0 .592.592a1.764 1.764 0 0 0 2.493 0l2.665-2.665 1.06 1.06-2.664 2.666a3.264 3.264 0 0 1-4.615 0l-.592-.592a3.263 3.263 0 0 1 0-4.614l3.85-3.85a3.264 3.264 0 0 1 4.614 0l.592.593-1.06 1.06-.592-.592c-.331-.33-.78-.516-1.247-.516" clip-rule="evenodd"></path></svg>

    </div>

  
    Copy link

</button>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F188646%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 32 32" fill="none" role="img"><path d="M18.666 13.857 29.093 2h-2.47l-9.056 10.294L10.338 2H2l10.932 15.567L2 30h2.47l9.557-10.873L21.662 30H30M5.36 3.822h3.795L26.62 28.267h-3.794" fill="currentColor"></path></svg>

    </div>

  
    Share on X

</a>
  <a class="dropdown__item" data-action="click-&gt;dropdown#hide" href="https://facebook.com/sharer.php?u=https%3A%2F%2Friskycreative.com%2Fsupporters%2Fvideo_embeds%2F188646%3Futm_medium%3Dcopy-share-link%26utm_source%3Dshare-link%26utm_campaign%3Dpost-share-supporter" target="_blank">
    <div class="dropdown__item-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 14 14" fill="none" role="img"><path d="m5.27 14-.02-6.125H2.625V5.25H5.25V3.5C5.25 1.138 6.713 0 8.82 0c1.009 0 1.876.075 2.129.109v2.468H9.488c-1.146 0-1.368.545-1.368 1.344V5.25h3.255L10.5 7.875H8.12V14H5.27Z" fill="currentColor"></path></svg>

    </div>

  
    Share on Facebook

</a>
    </div>
  </div>
</div>
          </div>

        </div>

      </div>
</div>

  </div>
</div>

</turbo-frame></template></turbo-stream>

<turbo-stream action="remove" target="posts_load_more"></turbo-stream>

  <turbo-stream action="append" target="posts_list"><template><turbo-frame id="posts_load_more">
  <a data-turbo-stream="true" data-controller="infinite-scroll" href="/supporters/load_more?last_id=188646&amp;last_live_at=2025-12-08T06%3A00%3A00.000%2B00%3A00&amp;order=desc"></a>
  <div class="loader">
  <svg class="loader__icon" viewBox="0 0 100 100">
    <circle class="loader__circle" cx="50" cy="50" r="45" />
  </svg>
</div>
</turbo-frame>
</template></turbo-stream>
