top of page


Phishing Emails Are Getting Sloppy: Real Example Breakdown
I recently received an email claiming my website was about to be suspended. The message claimed to be from Wix, my website host, and used a strong sense of urgency to try and get my attention. Naturally, I took a closer look. And honestly… it was pretty funny. Phishing email claiming to be from WIX We can start from top to bottom of the email. You can see its a "Compliance Notice" Looking at the sender, it comes from wixreportsystem.help@gmail.com Yes really, sent from a

Samuel Cork
Apr 153 min read


The 2013 Target Data Breach: How One Email Took Down a Giant
Transcript In 2013 a single overlooked email resulted in a data breach at Target, stealing the data of up to one hundred and ten million customers. A simple attack — targeting not Target itself, but a small heating and air-conditioning company in Pennsylvania. An email so ordinary, nobody thought twice before opening it. Inside that message was malware — silent, patient, and designed to steal. And that single moment would become the doorway to one of the largest retail data b

Samuel Cork
Oct 28, 20254 min read


Session Hijacking: What is it and How to Prevent It
Session Hijacking (also known as session stealing) is a common attack method used to take over a user's session. Taking over a session means the attacker (hacker) can impersonate you when you're logged into a website or application. This allows the attacker to perform any action you can, such as sending messages to your friends or accessing your private information, all without needing your password or MFA. What is Session Hijacking? Session Hijacking occurs when someone (typ

Samuel Cork
May 23, 20253 min read


Social Media Awareness: Discord Scammers after Tokens
Discord, a popular media platform, uses tokens to allow you to connect and stay connected to your account. This is a session token, and they often reset each session. This means if someone gets access to your Discord token, they essentially have access to your Discord account — no password needed. What Happens When Someone Gets Your Token? When someone else gets your token, they are then able to: Log into your account without needing your username or password. Bypass two-fact

Samuel Cork
May 18, 20253 min read


Social Media Awareness: Discord Link Embeds to Fake Websites
Discord phishing issue with fake links that may lead to account loss.

Samuel Cork
Oct 27, 20242 min read


Phishing 101: Spot Scams Before Becoming a Victim
What is Phishing? Phishing is a technique cybercriminals, also known as hackers, use to gain unauthorized access to personal accounts and sensitive data. The likelihood of encountering a phishing attempt is significant. Phishing is the most common method of cybercrime, with 3.4 billion spam emails sent every day as of July 2024 ( AAG IT Services , 2024). Put simply, phishing is when someone impersonates a trusted entity. For example, you may receive an email claiming to be fr

Samuel Cork
Sep 10, 20245 min read
bottom of page