aiattackattacksbanksbattlebeyondtrustbiancabountybreachbrianbugcatchingcenterchinesechriscodecutlercybercybersecuritydarkdatadeepfakesdevossengineeringexploithackhackerhackershackinghoursidentityjasonjohnkarll0phtlewislikeliterallylivemaiffretmalwaremarcmichaelmicrosoftmophishingprivilegespurpleransomwarerealredrogueroomryanscottsecuresecuritysocialspecialtommyuncoveringvirusvulnerabilitieswebworm