#EmailSecurity

2025-10-13

City of Raleigh Scam Alert: Stay Safe from Phishing Emails

The City of Raleigh’s Planning and Development Department has issued a warning about a phishing scam targeting community members who recently interacted with the department. These fraudulent emails appear to come from the City, requesting payment or sensitive information — but they are not legitimate.

The scam messages are designed to trick you into clicking malicious links, sharing personal information, or submitting payments through fake portals. Protect yourself by learning how to spot these scams and what steps to take if you receive one.

🧠 What To Do If You Receive a Suspicious Email

If you suspect that you’ve received a phishing email posing as the City of Raleigh:

🚫 Do not reply or click on any links. 🚫 Do not open attachments. 🗑 Report the email as spam or phishing, then delete it immediately.

🔍 How to Spot a Phishing Email

Phishing messages often look official — but small details can give them away. Here’s what to watch for:

Check the sender’s address. Official City of Raleigh emails from the Permit and Development Portal end in @raleighnc.gov. The fraudulent email reported in this scam was sent from raleighnc.gov@usa.com, which is not associated with the City. Watch for urgency or threats. Scammers often use alarming language to pressure you into taking action quickly — like “Immediate payment required” or “Your account will be suspended.” Hover before you click. Before clicking any link, hover your mouse to see the true URL. If it doesn’t match a trusted city address, don’t click it. Be wary of requests for personal data. The City of Raleigh will never ask for your Social Security number, banking details, or passwords via email.

✅ How to Verify City Communications

If you’re unsure whether an email is legitimate:

Visit the official Permit and Development Portal directly through the City’s website. Or contact the Customer Service Center at 919-996-2500 to confirm whether you have any outstanding invoices or applications.

🛡 Stay Vigilant and Protect Your Community

Phishing scams are becoming increasingly sophisticated, but awareness is your best defense. By staying alert, verifying official communications, and reporting suspicious messages, you help keep Raleigh’s digital community safe and secure.

For more information and updates, visit raleighnc.gov and follow the City’s official alerts.

Your week, your city, your fun — stay connected with everything happening in the Raleigh at DoRaleigh.com

#CityOfRaleigh #CyberSecurity #DoRaleigh #emailSecurity #News #phishingAwareness #PhishingEmail #phishingTips #PlanningAndDevelopmentDepartment #RaleighCommunityUpdates #RaleighGovernment #RaleighSafety #RaleighScamAlert

2025-10-13

Imagine getting an email that perfectly mimics a trusted colleague—almost impossible to spot as a scam. Varonis Interceptor’s multimodal AI is stepping in to catch these next-level phishing tricks. Ready to see how it’s changing the game in email security?

thedefendopsdiaries.com/how-va

#emailsecurity
#artificialintelligence
#phishingprotection
#cyberthreats
#varonisinterceptor

emt Technology Distributionemttech
2025-10-13

Spot the Fake 🕵️
Phishing emails can look almost identical to the real thing.
But small details give them away.

✅ Check logos, spelling, and tone
✅ Review links and attachments
✅ Compare with official emails

Train your eye to catch the phish.

@emt

Vicious Space ClippyPrometheus@infosec.exchange
2025-10-09

Tuta's Hanna interviewed by the Hated One.

I talked to the makers of the MOST SECURE EMAIL in the world. #privacy @thehatedone #tuta #emailsecurity

youtube.com/watch?v=6Xzv3n-DCpQ

2025-10-08

Was ist den so der aktuelle günstige Weg um an ein privates S/Mime Zertifikat zu kommen, das sauber unterstützt wird, in Apple Mail?
#SMime #eMailSecurity

2025-10-06

🚨 Threat Alert: One click can turn AI browsers against you.
CometJacking abuses Perplexity’s Comet AI browser, using prompt injection via malicious URLs to exfiltrate Gmail, Calendar, and connector data.
Key takeaways:
- No credentials stolen; browser already has access
- Base64 obfuscation bypasses protection checks
- Enterprises must monitor AI browser agent memory and prompt execution

Stay ahead of AI-native browser threats.

#CometJacking #CometAI #CyberSecurity #PromptInjection #InsiderThreat #LayerX #DataSecurity #EmailSecurity #CalendarSecurity #Infosec #ThreatIntel #AI

comet
Offensive Sequenceoffseq@infosec.exchange
2025-10-06

⚠️ Zimbra zero-day alert: CRITICAL vuln via iCalendar (.ics) attachments. No patch/CVE. Block .ics, disable auto-processing, monitor logs. Euro orgs in finance, gov at risk! radar.offseq.com/threat/zimbra #OffSeq #Zimbra #ZeroDay #EmailSecurity

Critical threat: Zimbra users targeted in zero-day exploit using iCalendar attachments
2025-10-06

🚨 Zero-day alert: Hackers exploited a Zimbra flaw using iCalendar (.ICS) files embedded with JavaScript.

The campaign spoofed the Libyan Navy and targeted a Brazilian military org before Zimbra issued a patch.

Attackers exfiltrated emails, credentials, and contacts using async payloads & Zimbra SOAP APIs.

Stay alert. Check filters, patch systems, and inspect large ICS files for Base64 code.

#Zimbra #ZeroDay #Infosec #EmailSecurity #ThreatIntel #CyberSecurity #Exploit #ICS #StrikeReady #XSS

zero day
2025-10-06

Hackers exploited a Zimbra zero-day via malicious .ICS calendar invites 📅💥 Injected scripts stole emails & credentials — patch now to ZCS 9.0.0 P44 / 10.0.13 / 10.1.5 or later 📢 #EmailSecurity #ThreatIntel

bleepingcomputer.com/news/secu

Zevonixzevonix
2025-10-04

📧 Stop email spoofing before it starts. Protect your domain with SPF, DKIM, and DMARC—your first line of defense against phishing. 🛡️
👉 zurl.co/weMkm

2025-10-03

🔍 Web Malware Scan Results

Website: www.comune.gonnoscodina.oristano.it
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/e178b7d2-

#EmailSecurity #Pentesting #URLScan #AIResearch

2025-10-03

🔍 Web Malware Scan Results

Website: www.odcecprato.com
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/eb9d71b8-

#CyberResilience #EmailSecurity #CyberDefense #ThreatIntel

2025-10-03

🔍 Web Malware Scan Results

Website: www.hamiltoncountytx.gov
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/ce946e2f-

#EmailSecurity #ZeroDay #CyberResilience

2025-10-03

🔍 Web Malware Scan Results

Website: www.bundeswehr.de
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/a396833b-

#RedTeam #SecurityAwareness #WebSecurity #EmailSecurity #AntiPhishing

2025-10-03

🔍 Web Malware Scan Results

Website: nymag.com
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/257258ea-

#URLScan #EmailSecurity #ZeroTrust

2025-10-03

Your email is a critical chokepoint for sensitive communications—commonly used to reset account passwords and to document purchases you’ve made hackernoon.com/email-security- #emailsecurity

2025-10-03

🔍 Web Malware Scan Results

Website: sumitravig.com
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/6a5e42eb-

#ThreatHunting #Pentesting #WebMalware #EmailSecurity

2025-10-03

🔍 Web Malware Scan Results

Website: www.gov.uk
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/a495fc25-

#EmailSecurity #DevSecOps #IncidentResponse

2025-10-03

🔍 Web Malware Scan Results

Website: nask.pl
Security Verdict: LOW RISK

Full analysis & details:
scanmalware.com/scan/00a9f4de-

#NIST #Phishing #ThreatDetection #EmailSecurity

2025-10-03

🔍 Web Malware Scan Results

Website: www.owatonna.gov
Security Verdict: MEDIUM RISK

Full analysis & details:
scanmalware.com/scan/8b97c7ff-

#ISO27001 #SOCAnalyst #DigitalSecurity #EmailSecurity #Phishing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst