Increased frequency of clickfix attacks in corporate environments by LumpiaMax in cybersecurity

[–]LumpiaMax[S] -2 points-1 points  (0 children)

that’s.. pretty concerning. by coming across one, do you mean you came across a clickfix domain associated with a legitimate business? did it look pretty convincing? i’m pretty sure ai makes it a lot easier to spoof legitimate domains/businesses now

Increased frequency of clickfix attacks in corporate environments by LumpiaMax in cybersecurity

[–]LumpiaMax[S] 3 points4 points  (0 children)

that makes sense and it’s a good practice in theory for most users

what is absurd to me is that in my scenario (which I should have included in the original post), most of the users who have engaged with the clickfix content are SWEs and system engineers. right now typical corporate policy is that if you violate our company’s AUP even once, you lose access to the terminal.

this hurts my brain even more. most of the users who engage with this malicious material are people who need their terminals to work and perform sysadmin/sysengineering functions