{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigh6wae42b6w2tyh5sx3ggzdjodfrt4b5p7wnyrrq5hckrwdun4ka",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mensp5qdkia2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiekuim3tfp4l6qbe3ubdiglvs75wgo35qbhfnr7oz2v6qc2ycad7e"
},
"mimeType": "image/webp",
"size": 65070
},
"path": "/sms-and-otp-bombing-bypass-analysis/",
"publishedAt": "2026-02-12T09:19:07.000Z",
"site": "https://thecyberexpress.com",
"tags": [
"link"
],
"textContent": "\nSMS and OTP bombing campaigns exploit 843 APIs using SSL bypass, automation, and voice-bombing tactics across regions.",
"title": "SMS and OTP Bombing Campaigns Found Abusing API, SSL and Cross-Platform Automation"
}