PornHub, OpenAI, and the Same SMS Phishing (Smishing) Failure

A dark themed illustration showing a hooded figure holding a torn sheet of paper displaying the Pornhub and Mixpanel logos, with shadowy hooded figures in the background suggesting a cyberattack.

This is a post to explain why PornHub’s extortion story matters far beyond adult content. This is the same phishing led analytics failure that exposed OpenAI customer data and impacted other Mixpanel customers who still haven’t come forward. Different brands. Same entry point. Same security failure. The problem isn’t who was targeted. It’s that phishing […]

Authorisation Code Abuse Is a Major Account Takeover Vector

Email from Spotify showing a one time login code for passwordless sign in.

This is an account takeover attack that bypasses phishing detection, malware controls, and authentication safeguards. It exploits legitimate authorisation workflows exactly as designed. There is currently no technical control that reliably prevents it. Awareness is the only effective defence. Some referring to this as “device code phishing” but I don’t think that’s technically correct. Phishing […]

When a Zero Trust Firewall is Not a Zero Trust Firewall

A diesel fuel nozzle and an electric car charging plug held facing each other, with overlaid text comparing threat detection to zero trust.

Here’s a good example of a security vendor claiming to offer a Zero Trust firewall that’s fundamentally different from everything else on the market. Technically, it isn’t. The same claim is made about their browser software. For the same reason, that isn’t zero trust either. It’s a threat detection firewall with better marketing. The single […]

Zero Trust for Web Links, PSD3, and Why Upstream Fraud Prevention Matters

Early Firefox browser extension showing trust and verification indicators directly inside Google search results using semantic content labels.

This article sits in the middle of an important exchange between Paul Rohan, Aidan Herbert, and my earlier post on PSD3, instant payments, and upstream fraud prevention. Paul challenged the casual use of the phrase “new paradigm” in security, arguing correctly that most so called innovations are just faster versions of the same reactive model. […]

AI Makes No Difference to Detecting Phishing. The Logic Is Impossible to Dispute.

Front entrance of a suburban house with a closed door and scattered tools on the ground, symbolising that only the entry point matters, not how the tools were made.

There’s a widespread belief that criminals using AI changes something about phishing detection. It doesn’t. And the reason it doesn’t is so simple that most people overlook it. Let’s start with the structure of a phishing attack. A phishing attack exists only when the final object exists. Everything before that moment is preparation, and preparation […]

The Real Mechanics of Phishing and the Behaviour That Makes It Possible

A landscape diagram with the words Web Link in the centre, with lines branching out to different fake destinations on the left and a range of real world consequences on the right.

90% of cybercrime begins with phishing and it usually comes down to one moment. A person interacts with a link they can’t assess after it slips past the security tools they rely on. This is why the link isn’t just the starting point for most attacks. It’s the single place where the entire chain can […]

Why do we still have to check links in 2025?

A person stands at a fork in the road, with one path labelled “Verified Link” in bright daylight and the other labelled “Suspicious Link” in darkness, symbolising the choice between safe and unsafe online actions.

Think about how you move through your digital life. Every time a text arrives, you pause. Every time an email lands, you hesitate. Every time you see an offer on social media, you wonder if it’s genuine. Every time someone sends you an app, you check it twice. We’ve all learned to slow down because […]