Email scams are no longer the primary threat. Phone calls are no longer the most persuasive. And text messages—once assumed to be harmless—are now the fastest-growing attack vector in consumer and …
Gravity Forms Supply Chain Attack: Backdoor Details, IOCs, and How to Stay Safe
Introduction On July 10–11, 2025, attackers compromised Gravity Forms’ official distribution channel, injecting malicious code into a core file within the plugin. The breach was quickly detected …
I am Embarrassed and Ashamed. I was Scammed!!!
Don't Get Caught Off Guard! This is an urgent warning for all small business owners in the United States of America that participated in the Paycheck Protection Program (PPP), a Small Business …
Continue Reading about I am Embarrassed and Ashamed. I was Scammed!!! →
The Shadowy Case of Lucas Casimir
Lucas Casimir appropriated my bank account! I don't know him. I don't know if this is his real name, or even if he is a male. But whomever he/she is, I'll never forget the name of Cybercriminal Lucas …
Cyber-MAD and WWIII
The proliferation of Stuxnet adds a new threat to the world stage. During the cold war, the Governments of East vs. West kept each other …
Anatomy of a Cyberattack
A cyberattack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset by hacking into a susceptible system. Cyberattacks are …





