top of page


2017 Equifax Data Breach: How Equifax Let Hackers Walk Away with America’s Identity
Half of America had their identity stolen in 2017, and barely anyone talks about it. Equifax, one of the largest credit reporting agencies in the U.S., was breached by hackers. And this wasn’t just a basic leak. Equifax holds some of the most sensitive data in the country, Social Security numbers, birthdays, driver’s licenses, addresses, everything a hacker needs to steal your identity. In total? 147 million Americans were exposed. That’s nearly half the adult population of t

Samuel Cork
Oct 20, 20252 min read


Session Hijacking: What is it and How to Prevent It
Session Hijacking (also known as session stealing) is a common attack method used to take over a user's session. Taking over a session means the attacker (hacker) can impersonate you when you're logged into a website or application. This allows the attacker to perform any action you can, such as sending messages to your friends or accessing your private information, all without needing your password or MFA. What is Session Hijacking? Session Hijacking occurs when someone (typ

Samuel Cork
May 23, 20253 min read


Social Media Awareness: Discord Scammers after Tokens
Discord, a popular media platform, uses tokens to allow you to connect and stay connected to your account. This is a session token, and they often reset each session. This means if someone gets access to your Discord token, they essentially have access to your Discord account — no password needed. What Happens When Someone Gets Your Token? When someone else gets your token, they are then able to: Log into your account without needing your username or password. Bypass two-fact

Samuel Cork
May 18, 20253 min read


Understanding Credential Stuffing: What It Is and How to Protect Your Data
In 2023, a corporation known as 23andMe suffered multiple credential stuffing attacks to their users. 23andMe collects genetic DNA information to match with others. The credential stuffing attack led to 5.5 million records and profiles ending up online. ( Bitdefender, 2023 ) What Is Credential Stuffing? Credential stuffing is a type of attack that mainly exploits users' inadequate security habits. Typically, when a user registers for a service, they input login details. It is

Samuel Cork
Sep 25, 20242 min read


Understanding the Basics of Brute Force Attacks: How They Work and What You Need to Know
In cybersecurity, a brute force attack is a technique used to gain unauthorized access to an account through sheer persistence. When setting up an account online, you usually provide your email address and set a password. Malicious individuals, commonly referred to as hackers, employ various strategies to acquire the login details you established for accessing your account or social media platforms. In simple terms, a brute force attack occurs when the attacker (hacker) repea

Samuel Cork
Sep 24, 20243 min read


Phishing 101: Spot Scams Before Becoming a Victim
What is Phishing? Phishing is a technique cybercriminals, also known as hackers, use to gain unauthorized access to personal accounts and sensitive data. The likelihood of encountering a phishing attempt is significant. Phishing is the most common method of cybercrime, with 3.4 billion spam emails sent every day as of July 2024 ( AAG IT Services , 2024). Put simply, phishing is when someone impersonates a trusted entity. For example, you may receive an email claiming to be fr

Samuel Cork
Sep 10, 20245 min read
bottom of page