aiattackattacksbanksbattlebeyondtrustbiancabountybreachbrianbugcatchingcenterchinesechriscodecybercybersecuritydarkdatadevossengineeringexploithackhackerhackershackinghoursidentityjasonjohnkarll0phtlewislikelivemaiffretmarcmichaelmicrosoftmophishingprivilegespurpleransomwarerealredrogueroomryanscottsecuresecuritysocialtommyuncoveringvirusvulnerabilitieswebworm