What Makes Phishing so effective?

There are some Docusign phishing attempts as catalogued here at Malwarebytes.com How can one really tell that it is not a legitimate Docusign instead of a fake site or fake email Looking at the true email address from section shows where the email is coming from (not the email name “from:” that you see in … Read more

What if We are Losing Cybersecurity War?

What is Cybersecurity?  Is it the way one uses and defends their data and systems? CISA the government agency (not my certifications Certified Information Systems Auditor by ISACA) … I know confusing right? https://www.cisa.gov/news-events/news/what-cybersecurity  I like to show you the full link so you know where you are going(not like phishing scams). Cybersecurity is explained … Read more

After Ransomware How to Rebound to Normal

If you got ransomware – now what?  How can you recover and get back to normal?   Here are some images of ransomware from older posts on this blog: Asking your favorite AI instance “After a confirmed ransomware attack what is a schedule to normality? I.e. step by step instructions to make sure no persistent … Read more

Clickjacking to Farm Facebook “Likes” Porn Pics are Bad

What is Clickjacking? “Porn sites are stuffing SVGs with clickjacking code to farm Facebook likes” refers to a specific type of cyberattack involving both SVG files and clickjacking techniques.   Above image is from Malwarebytes post…  if you notice (I did not make it a large image but it claims the images are porn images … Read more

DPRK Actively Trying to Make Money on Our Businesses

As these FBI Images show and the text “2 DPRK Agents actively bilked almost a Million$”: Jin Sung-Il and Pak Jin-Song are wanted for their alleged involvement in a fraudulent scheme to obtain remote information technology (IT) work with U.S. companies that generated revenue for the Democratic People’s Republic of Korea (DPRK). It is alleged … Read more