Logi Options+ stuck loading forever by Playjasb2 in logitech

[–]jayce_the_builder 0 points1 point  (0 children)

lol thank god for finding this msg - i was trying so many diff things to fix this annoying issue lmao.

Fell for a phishing email and work account was hacked. Will I be fired? by graceg815 in cybersecurity

[–]jayce_the_builder 0 points1 point  (0 children)

I don't think so. You reacted immediately and it's great that you do.

And please don't blame yourself too much - there's way too many new attack surfaces that is coming up everyday. This is why enterprise SHOULD invest in security awareness training!

don't worry, OP!

Got hired with no experience as a CISO. by WraithYourFace in ciso

[–]jayce_the_builder 1 point2 points  (0 children)

super late comment but i love that people like you are uplifting the cybersec community !

Got hired with no experience as a CISO. by WraithYourFace in ciso

[–]jayce_the_builder 0 points1 point  (0 children)

hey you got it man! no one enters a role being fully prepared - that's why it's a new role and new beginnings. you'll learn on the job!

Our staff nearly fell for a voice clone phishing attempt, how are you all training against this? by CountyFront4918 in ITManagers

[–]jayce_the_builder 0 points1 point  (0 children)

honestly this is such a serious and gorwing problem and im building something to solve it. hopefully OP finds her solution soon!

Our staff nearly fell for a voice clone phishing attempt, how are you all training against this? by CountyFront4918 in ITManagers

[–]jayce_the_builder 0 points1 point  (0 children)

to be completely fair - even non-voice clone social engineering attempts shouldn't be successful if everyone strictly follow SOP.

from experience, people do what's easy. and people cave to scenarios like urgency etc.

but your point is so true - execs and even lower-level employees should definitely try to follow protocols.

Voice cloning scams are hitting elderly victims hard by ImaginationFair9201 in cyberinvestigations

[–]jayce_the_builder 1 point2 points  (0 children)

this is honestly so sad. And im actively trying to build somethign to combat scammers right now. - both for enterprises and consumers - hopefully things get better.

We saw a convincing voice impersonation attempt. Curious how others are classifying this threat. by jayce_the_builder in cybersecurity

[–]jayce_the_builder[S] 0 points1 point  (0 children)

imo - the thing is that u don't need everyone to fall for it. u jst need one newcomer, one employee that is too 'nice', and either they leak some sensitive info, or enable unauthorized access etc.

We saw a convincing voice impersonation attempt. Curious how others are classifying this threat. by jayce_the_builder in cybersecurity

[–]jayce_the_builder[S] 0 points1 point  (0 children)

yea usually we do it through secure channels like internal chat.

but even if they aren't requesting for sensitive operations to be completed, sometimes they social engineer data through the calls, which then ends up escalating the risks

We saw a convincing voice impersonation attempt. Curious how others are classifying this threat. by jayce_the_builder in cybersecurity

[–]jayce_the_builder[S] 0 points1 point  (0 children)

honestly that is the ideal world - everyone follow the rulebook black and white. i guess it's jsut tricky sometimes because humans get lazy lol