{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigh6wae42b6w2tyh5sx3ggzdjodfrt4b5p7wnyrrq5hckrwdun4ka",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mensp5qdkia2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiekuim3tfp4l6qbe3ubdiglvs75wgo35qbhfnr7oz2v6qc2ycad7e"
    },
    "mimeType": "image/webp",
    "size": 65070
  },
  "path": "/sms-and-otp-bombing-bypass-analysis/",
  "publishedAt": "2026-02-12T09:19:07.000Z",
  "site": "https://thecyberexpress.com",
  "tags": [
    "link"
  ],
  "textContent": "\nSMS and OTP bombing campaigns exploit 843 APIs using SSL bypass, automation, and voice-bombing tactics across regions.",
  "title": "SMS and OTP Bombing Campaigns Found Abusing API, SSL and Cross-Platform Automation"
}