After Ransomware How to Rebound to Normal

If you got ransomware – now what?  How can you recover and get back to normal?   Here are some images of ransomware from older posts on this blog: Asking your favorite AI instance “After a confirmed ransomware attack what is a schedule to normality? I.e. step by step instructions to make sure no persistent … Read more

Clickjacking to Farm Facebook “Likes” Porn Pics are Bad

What is Clickjacking? “Porn sites are stuffing SVGs with clickjacking code to farm Facebook likes” refers to a specific type of cyberattack involving both SVG files and clickjacking techniques.   Above image is from Malwarebytes post…  if you notice (I did not make it a large image but it claims the images are porn images … Read more

DPRK Actively Trying to Make Money on Our Businesses

As these FBI Images show and the text “2 DPRK Agents actively bilked almost a Million$”: Jin Sung-Il and Pak Jin-Song are wanted for their alleged involvement in a fraudulent scheme to obtain remote information technology (IT) work with U.S. companies that generated revenue for the Democratic People’s Republic of Korea (DPRK). It is alleged … Read more

AI Implemented without Governance Concerns

As this story pointed out at the Register: “Enterprises neglect AI security – and attackers have noticed” The findings come from Big Blue’s Cost of a Data Breach Report 2025 report, which shows that AI-related exposures currently make up only a small proportion of the total, but these are anticipated to grow in line with … Read more