Introduction On July 10–11, 2025, attackers compromised Gravity Forms’ official distribution channel, injecting malicious code into a core file within the plugin. The breach was quickly detected …
I am Embarrassed and Ashamed. I was Scammed!!!
Don't Get Caught Off Guard! This is an urgent warning for all small business owners in the United States of America that participated in the Paycheck Protection Program (PPP), a Small Business …
Continue Reading about I am Embarrassed and Ashamed. I was Scammed!!! →
The Shadowy Case of Lucas Casimir
Lucas Casimir appropriated my bank account! I don't know him. I don't know if this is his real name, or even if he is a male. But whomever he/she is, I'll never forget the name of Cybercriminal Lucas …
Cyber-MAD and WWIII
The proliferation of Stuxnet adds a new threat to the world stage. During the cold war, the Governments of East vs. West kept each other …
Anatomy of a Cyberattack
A cyberattack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset by hacking into a susceptible system. Cyberattacks are …
The Role of Malicious Code in Cyberattacks
Malicious code refers to viruses, Trojan horses, worms, logic bombs, and any other software created for the purpose of attacking a platform. Virus: A code segment that replicates by …
Continue Reading about The Role of Malicious Code in Cyberattacks →





