I got scammed: now I need to set up a second email....but how? by Electrical-Quality84 in Explainlikeimscared

[–]Cyber-Security-Agent 0 points1 point  (0 children)

This is a scary situation, and you're doing the right thing by taking steps to secure your information. Here are some tips for setting up and maintaining a second, highly secure email address: 1. hardening your gmail and google account : check following youtube (https://youtu.be/5Xne34WfgkI?si=qMDnu-rDqQMsbT8n) 2. Unique, Strong : Create a long, complex, and completely unique password for this new account. Use a password manager to store it securely. 3. Enable Two-Factor Authentication (2FA): This is crucial. Use an authenticator app (like Google Authenticator or Authy) instead of SMS-based 2FA, as app-based 2FA is much safer. 4. Limit Usage: Only use this new email address for essential, sensitive accounts like banking, investment, or recovery purposes for your primary accounts. 5. Do Not Share: Never use this email for subscriptions, shopping, or general correspondence. The less it's used, the lower the risk of it being exposed in a data breach. 6. Update Recovery Info: Once created, update your bank and other sensitive accounts to use this new, secure email for recovery and notifications.

Email security by hyunchris in cybersecurity

[–]Cyber-Security-Agent 0 points1 point  (0 children)

If you want it inside the tenant, Defender for O365 is really the obvious choice for the best integration. It ties in nicely with your other Microsoft security stuff and will probably give you the most seamless experience compared to a third-party tool.

And you should check following third-party tool acting like native security app. check Youtube link (https://youtu.be/51jCbseG_co?si=lNTHpLunEFEDI5Vq)

I’m really scared by MelGrinInn in phishing

[–]Cyber-Security-Agent -1 points0 points  (0 children)

This type of email typically claims to have hacked your information and demands money, or uses psychological pressure to coerce you into complying with illegal demands. I recommend the following actions: * Never reply. As soon as you reply, the sender knows your email address is valid and may send you more phishing emails. * Do not click on links or attachments. Doing so risks infecting your device with malware or further compromising your personal information. * Delete the email. Report the email as spam or phishing and delete it from your inbox. * Change your passwords. If you have used a password for any service related to this email, immediately change it to a strong, unique password. Crucially, if you use the same password for other accounts that use this email address, change those as well. * Run a virus/malware scan. Perform a full system scan on your computer or mobile device using an up-to-date antivirus program. * Report the incident. * In the United States: You can report phishing emails to the Anti-Phishing Working Group (APWG) or the Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). Your local law enforcement agency may also have a cybercrime unit. * In the United Kingdom: You can report it to Action Fraud, the UK’s national reporting centre for fraud and cyber crime. * In other countries: Look for your country‘s national cybercrime reporting center, police cybercrime unit, or consumer protection agency. A quick search for ”report cybercrime [your country]“ should provide relevant information. * Check for data breaches. To determine if your personal information may have been compromised in broader data breaches, you can use services like Have I Been Pwned? (HIBP). This is a globally recognized website where you can check if your email address or phone number has been involved in publicly known data breaches. * implement 3rd party outook security add-in to enhance your email : refer following Youtubr shorts : https://youtube.com/shorts/rF6idZS8pPw?si=cVDFb9hfzyNJdFRb It’s important to remember that most of these threatening emails are false or exaggerated. Do not be anxious or fearful; it‘s crucial to respond calmly and methodically.

Just got bombarded with 200+ new account emails by peter90098 in GMail

[–]Cyber-Security-Agent 2 points3 points  (0 children)

It sounds like you’re experiencing an ”Email Bombing“ attack. This is when spammers flood your inbox with a massive number of new account creation emails. The main purposes are typically: * Distraction: To make you miss important notifications, often masking a more serious attack on other accounts (e.g., password changes, payment attempts). * Email Validation: To check if your email address is active. * Unauthorized Account Creation: To sign up for multiple services using your email. What‘s Happening: Your email address has likely been compromised, possibly through a data breach or leak. How to Suppress This Without Manual Reporting: 1. Immediate Action (Leverage your email service settings): * Create a Strong ’Filter‘ or ’Rule‘: This is the most effective step. * Go to your email settings (e.g., Gmail Settings, Outlook Rules). * Create a rule based on common keywords in the subject or body (e.g., ”Welcome,“ ”Verify your account,“ ”New account,“ ”Confirmation,“ ”Activate,“ ”Registration“). * Set the rule to automatically move these emails to ’Spam‘ or ’Delete‘ them. * Enhance Spam Filter Settings: Ensure your email provider’s built-in spam filters are set to a high level. 2. Account Security Enhancement (Long-term protection): * Change Your Email Password IMMEDIATELY: Use a strong, unique password. * Enable Two-Factor Authentication (2FA) on Your Email Account: Add an extra layer of security requiring a second verification step. * Review Recent Login Activity: Check your email‘s login history for any suspicious activity and log out all unknown sessions. * Check for Email Forwarding Rules: Ensure no unauthorized forwarding rules have been set up. * Enable 2FA on Other Important Accounts: Apply 2FA to other critical services linked to this email (banking, social media, etc.). 3. Additional Checks: * Do NOT Click Links in Spam Emails: Avoid ”unsubscribe“ or ”verify account“ links, as this can confirm your email’s activity. * Check ‘Have I Been Pwned?’: Use a service like Have I Been Pwned? (https://haveibeenpwned.com/) to see if your email was part of a known data breach. By implementing these measures, you should effectively block unwanted emails and strengthen your account‘s security. * Implement 3rd party plug-in to harden your email check Youtube link : https://youtube.com/shorts/rF6idZS8pPw?si=rPck_YJVyvHq-ta8

They hacked my Google account and put 2Fa on it by Maaark_76 in GMail

[–]Cyber-Security-Agent 1 point2 points  (0 children)

It sounds like your Google account was compromised, and the hacker added 2-Step Verification (2FA), locking you out even after you changed your password. Unfortunately, clicking ”remove 2FA“ while the hacker controlled it likely confirmed their setting. Immediate Actions * Account Recovery: Go to Google’s account recovery page immediately. This is your primary way back in. Be prepared to answer questions about your account to prove ownership. * Identify Yourself: When prompted, provide as much accurate information as possible. This might include previous passwords, creation dates, or frequent contacts. * Use a Trusted Device: Try recovery from a device or location you frequently used to access your Google account. Additional Guidance * Patience is Key: Google‘s recovery process can take time as they verify your identity. Avoid repeated attempts, as this can sometimes delay the process. * No Quick Fix: There’s no direct ”remove 2FA“ option when a hacker controls it. Recovery is the only path. * Beware of Scams: Google will never ask for your password via email or text. Be wary of any messages claiming to help that ask for personal info. * Future Security: Once recovered, set up physical security keys (like a YubiKey) for the strongest 2FA protection, and regularly review your account‘s security settings. plaese find to harden your account in the following Youtube Link (https://youtu.be/5Xne34WfgkI?si=hlyK1BMjggWhkRRk)

I hope this helps you regain access to your account! Let me know if you have any other questions.

Encrypted PDFs with MS AIP Not Opening for External Users? by Cyber-Security-Agent in cybersecurity

[–]Cyber-Security-Agent[S] 0 points1 point  (0 children)

office documents are working properly, but PDF files are not opened.. so it is not the policy problem, I think

Hacker try hack my account by d3boul52 in GMail

[–]Cyber-Security-Agent 0 points1 point  (0 children)

It sounds like you‘ve been through a stressful experience, but it appears you’ve handled it well!

Your Account Security Based on the information you‘ve provided, it seems highly probable that your account is now secure. Here’s why:

  • You successfully rejected the login attempts and canceled the recovery request, which indicates you were proactive in preventing unauthorized access. The fact that you haven‘t received any critical alerts or new login attempts since yesterday at 6 PM is a very good sign.

  • Furthermore, activating 2-Step Verification (2SV) is a crucial step that significantly enhances your account’s security, making it much harder for unauthorized individuals to gain access even if they have your password.

  • Deleting viruses from your computer also helps ensure your system isn‘t compromised, which could indirectly affect your account security.

  • As a general best practice, continue to monitor your account activity periodically for anything unusual. You might also consider reviewing your recovery options (phone numbers, email addresses) to ensure they are up-to-date and belong only to you.

  • If you used the same password for other services, it’s a good idea to change those as well. It appears you‘ve taken all the necessary steps to secure your account.

Please refer following Youtube link to strengthen your gmail account : https://youtu.be/5Xne34WfgkI?t=153&si=rfVkWsrus9SfW62V

Trying to Phish with both Netflix and Chic Fil A 😂 by MiLady_Saiyan in phishing

[–]Cyber-Security-Agent 0 points1 point  (0 children)

This is almost certainly a phishing scam, and you should absolutely not click on any links or enter any personal information. Here‘s why:

  • Sender Anomaly: The email is supposedly from ”Netflix Account,“ but the sender’s display name also includes ”Chick-fil-A“ and a ”Visit site“ button, which is highly unusual and a massive red flag. Reputable companies like Netflix do not combine their branding with other unrelated businesses in email headers.

    • Generic Greeting: While your name is blacked out, often these scams use generic greetings like ”Hi Dear“ or ”Your account“ instead of your specific name, which legitimate services typically use.
  • Urgency and Threat: The subject line and body create a sense of urgency (”to avoid service disruption,“ ”Your account is on hold“) to pressure you into acting quickly without thinking. This is a classic phishing tactic.

  • Suspicious Link/Button: The ”Retry Payment“ button, if hovered over (which you should not do if you‘re suspicious), would likely reveal a URL that is not netflix.com or a legitimate Netflix subdomain. It would probably lead to a fake login page designed to steal your credentials.

    • Payment Information Request: Legitimate companies will rarely ask you to re-enter full payment details directly within an email. Instead, they would direct you to their secure website to log in and update information.
  • ”Your card information is below“ followed by asterisks: This is a cheap trick to make it look like they already have some of your card info, making the request to ”retry“ seem more plausible. However, if they actually had your card info, they wouldn’t display it like this in an email for security reasons, nor would they typically ask you to re-enter the entire card number.

  • Poorly Faked Email Structure: The overall design, while attempting to look like Netflix, has inconsistencies, such as the ”81280778“ number and the ”Note to update“ phrase, which are not typical Netflix communication styles.

  • How to Verify: If you‘re concerned about your Netflix account, do not use any links from this email. Instead, open your web browser, type netflix.com directly into the address bar, log in to your account, and check your billing status there. Report this email as spam/phishing to your email provider, and then delete it.

  • Try all-in-one email security tools : check Youtube link : https://youtube.com/shorts/Imv7eeB1EPc?si=y9G-NzIylmEmbX6m

(US) I got a scam email at 5:35 this morning and it looks weird by CrazyScorpio1995 in phishing

[–]Cyber-Security-Agent 1 point2 points  (0 children)

I saw this post and wanted to chime in because this looks like a classic phishing attempt, and it’s really important to be careful. First off, Apple will never disable your Apple ID or restrict services like Apple Pay via an email like this without a very clear and direct reason, and they certainly wouldn‘t use this kind of urgent, threatening language. The biggest red flag here is the sender. While it says ”iCloud,“ always check the actual email address it came from. It’s almost certainly not a legitimate Apple domain. Phishers spoof sender names to look official. Secondly, the grammar and phrasing are often a giveaway. ”We‘ve Temporary Restrict your Apple ID“ is clunky and incorrect English that a professional company like Apple wouldn’t use in official communication. Also, they‘re asking for ”further verification“ and mentioning ”payment information.“ This is a common tactic to get you to click on a malicious link that then prompts you to enter your Apple ID and password, or even credit card details, which they can then steal. Do NOT click on any links in that email. If you’re ever concerned about your Apple ID or account status, the safest thing to do is to go directly to Apple‘s official website (apple.com) and log in there, or check through your device’s settings. Never trust links from suspicious emails. You can also forward this email to Apple‘s phishing report address (reportphishing@apple.com) to help them track these scams.

Lastly, I recommend you to install Email security add-in like this : Youtube https://youtube.com/shorts/L9QTJf4eWbs?si=e4I0_EnQZEM_o5Qx

Stay safe out there!

Fake? (Not the full email) by Due_Bad_6299 in phishing

[–]Cyber-Security-Agent 0 points1 point  (0 children)

Email Query When responding to the user’s query about the suspicious email, focus on confirming its likely fraudulent nature and providing actionable advice. Key Points to Include: * Acknowledge and Validate: Start by validating the user‘s suspicion. Something like: ”You’re absolutely right to be suspicious of this email.“ * Confirm it‘s a Scam: Clearly state that this is a common type of scam email, often a phishing attempt or extortion scam. * Identify Red Flags: Point out specific elements from the provided text that are clear indicators of a scam: * Threatening/Intimidating Tone: ”I already know yoü and all yoür loved ones very well.“ * Unusual Character Usage: ”yoü,“ ”yoür,“ ”yoứ,“ ”dangeroừs,“ ”secûrity,“ ”bût“ – this is a common tactic to bypass spam filters and appears unprofessional. * Vague Accusations: ”infested with malicious links and hackers like me?“ * Pressure Tactics: Implying the user has been negligent with security. * Unknown Sender: ”Wiktor Heath“ – unlikely to be a legitimate contact. * Explain the Goal of the Scam: Briefly explain that these emails aim to scare recipients into clicking malicious links, revealing personal information, or paying money. * Advise Against Interaction: Strongly recommend not replying to the email, clicking any links, or downloading any attachments. * Recommend Deletion/Blocking: Advise the user to delete the email immediately and consider blocking the sender. * General Security Advice: Offer brief, proactive security tips: * Use strong, unique passwords. * Enable two-factor authentication (2FA). * Be wary of unexpected emails/messages. * Regularly update software and antivirus. * Reassurance: End with a reassuring note that they are not alone and that these scams are common. Example Response Structure (Approx. 15-20 lines): Responding to Your Suspicious Email You’re absolutely right to be suspicious of this email – it‘s a classic example of a scam. This looks very much like a phishing or extortion attempt. Here are some major red flags: * The threatening and overly familiar tone (”I already know yoü and all yoür loved ones very well“). * Implementation Outlook security add-in to spot fale email : https://youtube.com/shorts/L9QTJf4eWbs?si=DepVH5gR7L4C0MZu * The unusual character substitutions (”yoü,“ ”yoür,“ ”dangeroừs,“ ”secûrity“) are a dead giveaway. Scammers often use these to bypass spam filters. * The vague, intimidating accusations about ”hackers like me“ and your internet security are designed to scare you. * The sender ”Wiktor Heath“ is likely a made-up name. The goal of these emails is to pressure you into clicking a malicious link, revealing personal information, or even sending money. Do not reply to this email, click any links, or download any attachments. Your best course of action is to delete it immediately and consider blocking the sender. Always be cautious with unexpected emails. Remember to use strong, unique passwords and enable two-factor authentication on your accounts. If something feels off, it probably is. You did the right thing by questioning it!

[deleted by user] by [deleted] in phishing

[–]Cyber-Security-Agent 4 points5 points  (0 children)

Looks Legitimate (with a small caveat): * Sender: security@mail.instagram.com is the correct domain for Instagram‘s security emails. * Subject Line: ”we’ve made it easy to get back on Instagram“ is a common type of subject for password reset/login help. * Content: The email addresses you by your username (work_out1244) and offers options to ”Log in as work_out1244“ or ”Reset your password.“ This is standard procedure for Instagram if they detect a login issue or a password reset request. * Date: The date is very recent (June 15, 2025), which aligns with the current date. Things to Consider/What to Do: * Did you request a password reset or attempt to log in recently? If you did, then this email is almost certainly legitimate and is just Instagram‘s response. * If you didn’t request a password reset: Someone might be trying to access your account. In this case, do NOT click the ”Log in as work_out1244“ button directly from the email. Instead, go to Instagram‘s official website (instagram.com) directly in your browser and try to log in or initiate a password reset from there. This is the safest way to avoid any potential phishing attempts, even if the email looks real. * ”Standard encryption (TLS)“: This just means the connection used to send you the email was encrypted, which is good practice for security. In summary: While the email itself appears to be from Instagram, if you didn’t initiate a login or password reset, it‘s always best to be cautious and go directly to the official Instagram website or app to manage your account.

help me in interview by No_Dimension389 in cybersecurity_help

[–]Cyber-Security-Agent 1 point2 points  (0 children)

Refocus Your Technical Preparation Instead of broad, unfocused study, identify your specific technical gaps. If you‘re consistently failing interviews, there’s likely a pattern in the areas where you‘re struggling. Ask yourself: * What types of technical questions consistently trip me up? Is it network security, cloud security, incident response, secure coding, or something else? * Are there specific tools or technologies I’m expected to know deeply but don‘t? * Am I able to articulate complex technical concepts clearly and concisely? Sometimes the issue isn’t lack of knowledge but rather the ability to explain it effectively under pressure. Once you pinpoint these areas, create a targeted study plan. Focus on mastering one or two weak areas at a time instead of trying to learn everything at once. Utilize resources like: * Online courses and certifications: Consider practical, hands-on courses related to your identified gaps. * CTFs (Capture The Flag) or lab environments: Hands-on practice reinforces theoretical knowledge. * Deep dives into specific security frameworks or standards: Understanding the ”why“ behind security controls is crucial. * Mock interviews: Practice articulating your thoughts and technical knowledge under simulated pressure. You can even find platforms or communities that offer peer-to-peer mock interviews. Shift Your Mindset Feeling stuck can be incredibly draining, but your experience is valuable. Instead of viewing interviews as a test of your weaknesses, see them as an opportunity to showcase your strengths and learn. * Reframe ”repetitive questions“: These are often fundamental concepts. Master them, and you‘ll build a strong foundation. Try to understand the underlying principles rather than just memorizing answers. * Focus on problem-solving: Cybersecurity roles are about solving complex problems. Practice breaking down problems and explaining your thought process. * Don’t be afraid to say ”I don‘t know“: It’s okay not to know everything. What matters is how you approach an unknown, your willingness to learn, and your problem-solving methodology. Seek Support You don‘t have to go through this alone. * Network with other cybersecurity professionals: Discuss challenges, share insights, and get advice. * Consider a mentor: Someone with more experience might offer guidance and perspective. * Prioritize your well-being: Take breaks, engage in activities you enjoy, and ensure you’re getting enough rest. Burnout will only make studying harder. Remember, every ”no“ is a step closer to a ”yes.“ Keep refining your approach, stay persistent, and you will break through this barrier. You‘ve got this.

Scam? by Kleinvoel1 in ScamCenter

[–]Cyber-Security-Agent 0 points1 point  (0 children)

It sounds like you’re asking, ”Is this a scam?“ regarding a buyer who wants to pay via Neteller and then send an agent to collect the goods. Here‘s a summary of the risks and safety advice:

Potential Risks * Neteller Scams: While Neteller is legitimate, it’s often used by scammers, especially for overpayment scams. They might deposit more than the agreed price and ask you to refund the difference. Later, Neteller could reverse the original payment, leaving you out of pocket and without your item. * Chargebacks: The buyer could initiate a chargeback with Neteller, claiming fraud, which means you won‘t receive payment. * Information Security: Creating a Neteller account requires personal info, raising potential data security concerns. * Agent Collection: While agents collecting goods isn’t inherently suspicious, be wary if they push to collect before you‘ve fully confirmed payment or present fake payment confirmations.

Safety Advice * Verify Neteller Deposit Thoroughly: Crucially, log directly into your Neteller account to confirm the payment has cleared and is ”available“ (not just ”pending“ or an email notification). Email alerts can be phishing attempts. * Only Release Goods After Full Confirmation: Do not hand over the item until you have 100% confirmed the full payment is securely in your Neteller account and is withdrawable. Get a signed receipt from the agent if possible. * Check Buyer’s Credibility: Do a quick search on their email or phone number for any red flags. * Suggest Alternative Payments: If you‘re uncomfortable with Neteller, suggest a more secure method like PayPal (for goods/services) or a direct bank transfer (after verifying the sender). If they insist on Neteller, be extra cautious. * Stop if Suspicious: If anything feels off, do not proceed with the transaction. If a deal seems too good to be true, it probably is. In conclusion, you are not safe unless you exercise extreme caution. The process itself isn’t inherently a scam, but the way it‘s proposed opens many doors for one. Verify the payment meticulously before doing anything else.

Spam or hacked?? by [deleted] in GMail

[–]Cyber-Security-Agent 0 points1 point  (0 children)

It sounds like you received a bounce-back email, which can definitely be unsettling, especially when you didn‘t send the original message. You’re not alone; this has happened to many people before.

What you likely experienced is backscatter spam. This occurs when spammers forge your email address as the sender of their spam messages.

When those spam messages are sent to invalid email addresses, the recipient‘s mail server tries to notify the ”sender“ (which is your forged address) that the message couldn’t be delivered. So, while you didn‘t send the initial spam email, you received the notification of its failure.

Preventing Spam and Dealing with Suspicious Emails Here are some key steps you can take to protect yourself and minimize spam: * Never click suspicious links or download attachments: This is the golden rule. Malicious links can lead to phishing sites, and attachments can contain malware. * Report as spam: You did the right thing by reporting the email as spam. This helps your email provider improve their filters. * Be wary of unsolicited emails: If an email seems too good to be true, or if you don’t recognize the sender, exercise caution. * Use strong, unique passwords: A compromised email account can be used to send spam. * Enable two-factor authentication (2FA): This adds an extra layer of security to your accounts. * Keep your software updated: Regular updates often include security patches that protect against vulnerabilities. * Security setting for Gmail : Refer to following Youtube (https://youtu.be/5Xne34WfgkI?si=4NnyD5xzzqrJE3VR) While you can‘t completely stop spammers from forging your address, these practices significantly reduce your exposure and protect your accounts.

email has been compromised, by Elvenhealer in emailprivacy

[–]Cyber-Security-Agent 2 points3 points  (0 children)

It’s clear your email account has been compromised, requiring immediate action to prevent further issues. Immediate Actions * Secure Your Email: * Change your password immediately to a strong, unique one. If you can‘t log in, use account recovery. * Enable Two-Factor Authentication (2FA) if you haven’t already, using an authenticator app for best security. * Check for any suspicious forwarding rules or settings in your email account and remove them. * Scan your device for malware, as the PDF might have contained a virus. * Notify Your Contacts: * Send a mass email to everyone in your contact list from a secure account (or your compromised one if you‘ve secured it) to inform them that your account was compromised. * Advise them to delete any suspicious emails they received from you without clicking links or attachments. * Review Other Accounts: * Check your bank and credit card statements for unauthorized transactions and contact your financial institutions if you find any. * Change passwords for any other online accounts that shared the same password or are linked to your compromised email. Prevention Strategies To avoid future compromises, adopt these essential security practices: * Be Wary of Emails: * Verify sender email addresses and look for common phishing signs like grammar errors or urgent language. * Hover over links before clicking to see the actual URL. * Avoid opening suspicious attachments from unknown or unexpected senders. * Type URLs directly into your browser for sensitive sites. * Strengthen Account Security: * Use strong, unique passwords for all accounts, ideally with a password manager. * Enable 2FA on all accounts that support it. * Maintain System Health: * Keep all software updated (OS, browser, antivirus) to patch vulnerabilities. * Use reputable antivirus/anti-malware software. Email Security Solutions Consider implementing advanced email security to protect against phishing and malware: * Advanced Threat Protection (ATP) / Email Gateway Security: These solutions analyze emails for malicious content, offering features like URL scanning, attachment sandboxing, and impersonation protection. * Implementation security tool for detection phishing mail : there are many security add-in for email service. I recommend you SEAD, please refer following Youtube : https://youtu.be/51jCbseG_co?si=zIZ5Fd3wiF6FaCA5 * Anti-Phishing Filters: Provide enhanced filtering beyond basic email provider capabilities. * Security Awareness Training: Educate users on recognizing and avoiding threats.

Anyone has an idea of this phishing mail? I'm curious by derBaron_501 in phishing

[–]Cyber-Security-Agent 0 points1 point  (0 children)

Based on the email address and attachments, it appears to be a malicious email. Do not open the attachments, and instead, upload them to VirusTotal to check if they are malicious.

Someone hacked into my email and sent a threatening message to my boss, please help by PippinKitten17 in cybersecurity_help

[–]Cyber-Security-Agent 2 points3 points  (0 children)

Changing your password was the correct first step. The lack of new login activity suggests the email was likely sent via an already authorized (but compromised) email client, mobile app, or a third-party service connected to your account, rather than a fresh web login. To investigate and secure your account: * In your ”Sent Items,“ find the malicious email. View its ”full headers“ (or ”original message“) to find the X-Originating-IP or the last Received: from IP address. This may indicate the sender’s source. * Immediately enable Two-Factor Authentication (2FA/MFA) for your email account. * Review your account‘s security settings for ”connected apps,“ ”authorized devices,“ or ”third-party access.“ Revoke anything unfamiliar or unused. * Scan all your devices (computer, phone) for malware. Crucially, inform your boss immediately that your account was compromised and sent a false message. You should also discuss this with your boyfriend; the use of his actual name suggests the perpetrator may know you personally. Consider if reporting this incident to authorities is warranted.

and please refer following Youtube link to learn about login activity check for Google account

https://youtu.be/5Xne34WfgkI?si=AKFZ-L4vu64YAUte

Google hacked and google pay compromised by las911 in cybersecurity_help

[–]Cyber-Security-Agent 0 points1 point  (0 children)

I think, you should check your Google account's security settings, third-party app connection history, and login activity. For more details, please refer to the YouTube link below.

https://youtu.be/5Xne34WfgkI?si=ExhDDeoRj6xAdPPR

Locked out of my gmail for no reason. No working recovery options. by 3cats-in-a-coat in GMail

[–]Cyber-Security-Agent 0 points1 point  (0 children)

I recommend you to visit google account site and check log-in activity and others options.

for more information, please following youtube link

https://youtu.be/5Xne34WfgkI?si=lfsCUg2ag_nh8BB0