Skip to content
The Realist Juggernaut

The Realist Juggernaut

There's a Powerful Force in Realism

Tag: Ransomware

CRYPTOCURRENCY AND AI FRAUD SURGE — FBI IC3 REPORT DOCUMENTS RECORD $20.8 BILLION IN LOSS AS DIGITAL SCAMS SCALE THROUGH AUTOMATION AND SOCIAL ENGINEERING

CRYPTOCURRENCY AND AI FRAUD SURGE — FBI IC3 REPORT DOCUMENTS RECORD $20.8 BILLION IN LOSS AS DIGITAL SCAMS SCALE THROUGH AUTOMATION AND SOCIAL ENGINEERING

Artificial Intelligence
LEAK BAZAAR EMERGENCE — RANSOMWARE DATA MONETIZATION SHIFTS FROM EXTORTION TO STRUCTURED EXPLOITATION PIPELINES

LEAK BAZAAR EMERGENCE — RANSOMWARE DATA MONETIZATION SHIFTS FROM EXTORTION TO STRUCTURED EXPLOITATION PIPELINES

Blogging
Ransomware Suspect Identified in Prior TRJ Investigation Released in Russia–France Prisoner Exchange

Ransomware Suspect Identified in Prior TRJ Investigation Released in Russia–France Prisoner Exchange

Blogging
Sedgwick Confirms Cyber Incident at Federal Contractor Subsidiary Following TridentLocker Ransomware Claim

Sedgwick Confirms Cyber Incident at Federal Contractor Subsidiary Following TridentLocker Ransomware Claim

Blogging
THE CYBER BATTLEFIELD RESETS

THE CYBER BATTLEFIELD RESETS

Blogging
Two U.S. Cybersecurity Professionals Plead Guilty in ALPHV BlackCat Ransomware Extortion Scheme Targeting American Victims

Two U.S. Cybersecurity Professionals Plead Guilty in ALPHV BlackCat Ransomware Extortion Scheme Targeting American Victims

Blogging
Two More U.S. Banks Confirm Customer Data Exposure Linked to Marquis Software Ransomware Attack

Two More U.S. Banks Confirm Customer Data Exposure Linked to Marquis Software Ransomware Attack

Blogging
WASHINGTON COUNTY LIBRARY BREACH EXPOSES 340,000 RECORDS AS RANSOMWARE TARGETING OF CIVIC SYSTEMS ACCELERATES

WASHINGTON COUNTY LIBRARY BREACH EXPOSES 340,000 RECORDS AS RANSOMWARE TARGETING OF CIVIC SYSTEMS ACCELERATES

Blogging
Pierce County Library System Cyber Breach — 340,000+ Records Exposed in Ransomware Intrusion

Pierce County Library System Cyber Breach — 340,000+ Records Exposed in Ransomware Intrusion

Blogging
TRJ CYBERSECURITY INTEL REPORT

TRJ CYBERSECURITY INTEL REPORT

AI Risk & Automation
LG Energy Solution Confirms Ransomware Attack on Overseas Facility

LG Energy Solution Confirms Ransomware Attack on Overseas Facility

Blogging
Pro-Russian Group Hits Danish Party Websites as Voters Head to Polls

Pro-Russian Group Hits Danish Party Websites as Voters Head to Polls

Blogging
LOGITECH BREACH TIED TO ZERO-DAY EXPLOIT IN THIRD-PARTY PLATFORM

LOGITECH BREACH TIED TO ZERO-DAY EXPLOIT IN THIRD-PARTY PLATFORM

Blogging
PENNSYLVANIA OAG RANSOMWARE BREACH (SSNs + MEDICAL RECORDS EXPOSED)

PENNSYLVANIA OAG RANSOMWARE BREACH (SSNs + MEDICAL RECORDS EXPOSED)

Blogging
KENYAN GOVERNMENT WEBSITES DEFACE IN COORDINATED EXTREMIST ATTACK

KENYAN GOVERNMENT WEBSITES DEFACE IN COORDINATED EXTREMIST ATTACK

Blogging
PRINCETON UNIVERSITY ADVANCEMENT DATABASE BREACH

PRINCETON UNIVERSITY ADVANCEMENT DATABASE BREACH

Blogging
PORT ALLIANCE LOGISTICS ATTACK

PORT ALLIANCE LOGISTICS ATTACK

Blogging
OPERATION ARUBA PHISH: INSIDE THE EUROPEAN PHISHING ENGINE TARGETING MILLIONS

OPERATION ARUBA PHISH: INSIDE THE EUROPEAN PHISHING ENGINE TARGETING MILLIONS

Blogging
LIGHTHOUSE: The Smishing Engine — Inside the Global Phishing Kit Flooding Millions of Devices

LIGHTHOUSE: The Smishing Engine — Inside the Global Phishing Kit Flooding Millions of Devices

Blogging
THE SOUTHEAST ASIA STRIKE FORCE — U.S. Moves to Disrupt Billion-Dollar Cyber Scam Compounds

THE SOUTHEAST ASIA STRIKE FORCE — U.S. Moves to Disrupt Billion-Dollar Cyber Scam Compounds

Blogging
RUSSIAN HACKER TO PLEAD GUILTY TO AIDING YANLUOWANG RANSOMWARE GROUP

RUSSIAN HACKER TO PLEAD GUILTY TO AIDING YANLUOWANG RANSOMWARE GROUP

Blogging
TRJ CYBERSECURITY — ANDROID SPYWARE “LANDFALL”

TRJ CYBERSECURITY — ANDROID SPYWARE “LANDFALL”

Blogging
TRJ CYBERSECURITY INTEL REPORT — LATEST THREATS ROUNDUP

TRJ CYBERSECURITY INTEL REPORT — LATEST THREATS ROUNDUP

AI Threat Intelligence
The £300 Million Breach — How the M&S Cyberattack Shattered British Retail Stability

The £300 Million Breach — How the M&S Cyberattack Shattered British Retail Stability

Blogging
AI-Adaptive Malware — When Code Learns to Rewrite Itself

AI-Adaptive Malware — When Code Learns to Rewrite Itself

AI Threat Intelligence
Freight in the Crosshairs: Hackers Turn Remote Monitoring Tools into Weapons for Cargo Theft

Freight in the Crosshairs: Hackers Turn Remote Monitoring Tools into Weapons for Cargo Theft

Blogging
Data for Ransom: Russia-Linked Group Hits Japanese Retail Giant Askul in 1.1 TB Exposure Breach

Data for Ransom: Russia-Linked Group Hits Japanese Retail Giant Askul in 1.1 TB Exposure Breach

Blogging
The $120 Million Breach: Balancer DeFi Protocol Hacked in Massive Smart-Contract Exploit

The $120 Million Breach: Balancer DeFi Protocol Hacked in Massive Smart-Contract Exploit

Blogging
Chinese Hackers Target Global Cisco ASA Firewalls — Storm-1849 Expands State-Sponsored Exploitation Campaign

Chinese Hackers Target Global Cisco ASA Firewalls — Storm-1849 Expands State-Sponsored Exploitation Campaign

Blogging
Conti Ransomware Operator Extradited from Ireland to Tennessee — Ukrainian National Faces 25 Years for Global Cyber Extortion Scheme

Conti Ransomware Operator Extradited from Ireland to Tennessee — Ukrainian National Faces 25 Years for Global Cyber Extortion Scheme

Blogging
Open-Source Tool Turned Weapon: AdaptixC2 Finds New Life in Russia’s Cybercrime Circles

Open-Source Tool Turned Weapon: AdaptixC2 Finds New Life in Russia’s Cybercrime Circles

Blogging
REPUTATION.COM DATA LEAK — 120 MILLION RECORDS EXPOSED: BACKEND SYSTEM LOGS, SESSION COOKIES, AND CORPORATE ACCESS KEYS FOUND ONLINE

REPUTATION.COM DATA LEAK — 120 MILLION RECORDS EXPOSED: BACKEND SYSTEM LOGS, SESSION COOKIES, AND CORPORATE ACCESS KEYS FOUND ONLINE

Blogging
Former Defense Executive Admits to Selling U.S. Cyber Exploits to Russian Broker

Former Defense Executive Admits to Selling U.S. Cyber Exploits to Russian Broker

Corporate Accountability
CONDUENT CYBER BREACH — OVER 10 MILLION IMPACTED IN GOVERNMENT DATA EXPOSURE

CONDUENT CYBER BREACH — OVER 10 MILLION IMPACTED IN GOVERNMENT DATA EXPOSURE

Blogging
CLOUD ATLAS TARGETS RUSSIAN AGRICULTURE SECTOR AHEAD OF MOSCOW INDUSTRY FORUM

CLOUD ATLAS TARGETS RUSSIAN AGRICULTURE SECTOR AHEAD OF MOSCOW INDUSTRY FORUM

Agriculture & Farming
HERODOTUS — THE HUMAN TYPING TROJAN

HERODOTUS — THE HUMAN TYPING TROJAN

Android Exploitation
THE QILIN THREAT — Ransomware Empire Expands, Targets Surge Across Continents

THE QILIN THREAT — Ransomware Empire Expands, Targets Surge Across Continents

Blogging
THE UPDATE THAT OPENED THE GATE — CISA ORDERS IMMEDIATE PATCH FOR CRITICAL WSUS FLAW

THE UPDATE THAT OPENED THE GATE — CISA ORDERS IMMEDIATE PATCH FOR CRITICAL WSUS FLAW

Blogging
PATCH PORTAL COMPROMISED — Remote Code Execution Through WSUS

PATCH PORTAL COMPROMISED — Remote Code Execution Through WSUS

Blogging
DUBLIN AIRPORT DATA HEIST — EVEREST GROUP CLAIMS 1.5 MILLION PASSENGER RECORDS

DUBLIN AIRPORT DATA HEIST — EVEREST GROUP CLAIMS 1.5 MILLION PASSENGER RECORDS

Aviation Infrastructure
HOUSE OVERSIGHT COMMITTEE LAUNCHES PROBE INTO TEAONHER OVER ALLEGED ILLEGAL CONTENT AND SECURITY FAILURES

HOUSE OVERSIGHT COMMITTEE LAUNCHES PROBE INTO TEAONHER OVER ALLEGED ILLEGAL CONTENT AND SECURITY FAILURES

Blogging
U.S. TO ATTEND U.N. CYBERCRIME TREATY SIGNING IN HANOI AMID PRIVACY AND SOVEREIGNTY CONCERNS

U.S. TO ATTEND U.N. CYBERCRIME TREATY SIGNING IN HANOI AMID PRIVACY AND SOVEREIGNTY CONCERNS

Blogging
COUNTER RANSOMWARE INITIATIVE CALLS FOR STRONGER GLOBAL SUPPLY-CHAIN DEFENSES

COUNTER RANSOMWARE INITIATIVE CALLS FOR STRONGER GLOBAL SUPPLY-CHAIN DEFENSES

Blogging
NORTH KOREAN HACKING GROUP TARGETS EUROPEAN DRONE MAKERS WITH SCORINGMATHTEA MALWARE

NORTH KOREAN HACKING GROUP TARGETS EUROPEAN DRONE MAKERS WITH SCORINGMATHTEA MALWARE

Blogging
TINDER TO EXPAND FACE VERIFICATION TECHNOLOGY ACROSS MORE U.S. STATES

TINDER TO EXPAND FACE VERIFICATION TECHNOLOGY ACROSS MORE U.S. STATES

Biometrics
POLISH OFFICIAL INDICTED OVER PEGASUS SPYWARE PURCHASE — $6.9 MILLION DIVERTED FROM CRIME VICTIM FUND

POLISH OFFICIAL INDICTED OVER PEGASUS SPYWARE PURCHASE — $6.9 MILLION DIVERTED FROM CRIME VICTIM FUND

Blogging
RUSSIAN GOVERNMENT TARGETED BY CAVALRY WEREWOLF — KAZAKH-LINKED CYBER ESPIONAGE GROUP MASQUERADES AS KYRGYZ OFFICIALS

RUSSIAN GOVERNMENT TARGETED BY CAVALRY WEREWOLF — KAZAKH-LINKED CYBER ESPIONAGE GROUP MASQUERADES AS KYRGYZ OFFICIALS

Blogging
SPACEX TERMINATES OVER 2,000 STARLINK UNITS LINKED TO MYANMAR SCAM COMPOUNDS — GLOBAL PRESSURE MOUNTS ON SATELLITE INTERNET ABUSE

SPACEX TERMINATES OVER 2,000 STARLINK UNITS LINKED TO MYANMAR SCAM COMPOUNDS — GLOBAL PRESSURE MOUNTS ON SATELLITE INTERNET ABUSE

Blogging
UNITED STATES CYBER DISRUPTIONS — TEXAS, TENNESSEE, AND INDIANA REPORT ATTACKS IMPACTING LOCAL GOVERNMENT SERVICES

UNITED STATES CYBER DISRUPTIONS — TEXAS, TENNESSEE, AND INDIANA REPORT ATTACKS IMPACTING LOCAL GOVERNMENT SERVICES

Blogging
JAGUAR LAND ROVER CYBERATTACK SENDS SHOCKWAVES THROUGH BRITISH INDUSTRY — $2.5 BILLION ECONOMIC HIT REVEALED

JAGUAR LAND ROVER CYBERATTACK SENDS SHOCKWAVES THROUGH BRITISH INDUSTRY — $2.5 BILLION ECONOMIC HIT REVEALED

Automotive Industry
JEWETT-CAMERON RANSOMWARE BREACH — MEETING VIDEOS AND FINANCIAL RECORDS EXFILTRATED AHEAD OF SEC FILING

JEWETT-CAMERON RANSOMWARE BREACH — MEETING VIDEOS AND FINANCIAL RECORDS EXFILTRATED AHEAD OF SEC FILING

Blogging
AWS Outage Exposes the Real Vulnerability — When Experience Walks Out the Door

AWS Outage Exposes the Real Vulnerability — When Experience Walks Out the Door

Blogging
Google Detects Russian Hackers Rebuilding Spyware Arsenal After Exposure

Google Detects Russian Hackers Rebuilding Spyware Arsenal After Exposure

Blogging
SYSTEM BREACH: Active Exploitation of Windows SMB Flaw Grants Hackers Full Control Across Networks

SYSTEM BREACH: Active Exploitation of Windows SMB Flaw Grants Hackers Full Control Across Networks

Blogging
Russia Orders Apple to Prioritize Domestic Search Engines — Moscow Tightens Grip on Digital Sovereignty

Russia Orders Apple to Prioritize Domestic Search Engines — Moscow Tightens Grip on Digital Sovereignty

Blogging
WHEN TRUST GOES PUBLIC: THE DUKAAN DATA LEAK THAT NOBODY SAW

WHEN TRUST GOES PUBLIC: THE DUKAAN DATA LEAK THAT NOBODY SAW

Blogging
Ransomware Attack Disrupts Askul — Japan’s Retail Supply Chain Brought to a Standstill

Ransomware Attack Disrupts Askul — Japan’s Retail Supply Chain Brought to a Standstill

Blogging
Verisure Data Breach: Home Security Firm Compromised After Record IPO

Verisure Data Breach: Home Security Firm Compromised After Record IPO

Blogging
THE DIGITAL SMUGGLERS — Europe Unmasks a SIM Empire That Fueled Global Fraud, Identity Laundering, and Underground Infrastructure

THE DIGITAL SMUGGLERS — Europe Unmasks a SIM Empire That Fueled Global Fraud, Identity Laundering, and Underground Infrastructure

Blogging
THE MASKED CONNECTION — Inside the SIM Card Empire That Enabled Global Fraud, Fake Accounts, and Untraceable Exploits

THE MASKED CONNECTION — Inside the SIM Card Empire That Enabled Global Fraud, Fake Accounts, and Untraceable Exploits

Blogging
EXFILTRATION THROUGH THE BACKDOOR BRAND — CL0P Breach of Envoy Air’s Oracle EBS System Sparks Supply Chain Alarm

EXFILTRATION THROUGH THE BACKDOOR BRAND — CL0P Breach of Envoy Air’s Oracle EBS System Sparks Supply Chain Alarm

Aviation
THE PASSWORD PLAGUE: Microsoft Confirms Surge in Identity Attacks Driven by Leaked Credentials and Social Engineering Warfare

THE PASSWORD PLAGUE: Microsoft Confirms Surge in Identity Attacks Driven by Leaked Credentials and Social Engineering Warfare

Blogging
BLOCKCHAIN TURNED AGAINST US: North Korean State Hackers Weaponize Decentralized Infrastructure

BLOCKCHAIN TURNED AGAINST US: North Korean State Hackers Weaponize Decentralized Infrastructure

APT Threats
Dairy Farmers of America Ransomware Breach: Social Engineering Opens Floodgates to Stolen ID, Medicare, and Banking Data

Dairy Farmers of America Ransomware Breach: Social Engineering Opens Floodgates to Stolen ID, Medicare, and Banking Data

Blogging
Law Enforcement to Gain Easier Access to Ring Footage Through Controversial Flock Partnership

Law Enforcement to Gain Easier Access to Ring Footage Through Controversial Flock Partnership

Blogging
THE NATION-STATE ADVANTAGE: How a Breach of F5 Source Code Became a Silent Weapon Against U.S. Federal Networks

THE NATION-STATE ADVANTAGE: How a Breach of F5 Source Code Became a Silent Weapon Against U.S. Federal Networks

Blogging
LOOSE THREADS IN THE SUPPLY CHAIN: How a Vendor Breach at Mango Exposed Global Customer Data — Without Touching the Core

LOOSE THREADS IN THE SUPPLY CHAIN: How a Vendor Breach at Mango Exposed Global Customer Data — Without Touching the Core

Blogging
New York Slaps $14.2M in Penalties on Auto Insurers After Silent Data Harvest Breach

New York Slaps $14.2M in Penalties on Auto Insurers After Silent Data Harvest Breach

Blogging
WHEN ALLIES TURN SILENT: Chinese APT ‘Jewelbug’ Breaches Russian IT Firm in Covert Supply-Chain Operation

WHEN ALLIES TURN SILENT: Chinese APT ‘Jewelbug’ Breaches Russian IT Firm in Covert Supply-Chain Operation

Blogging
FEDS SEIZE $15 BILLION FROM CAMBODIAN BUSINESS TYCOON LINKED TO GLOBAL CYBER SCAM EMPIRE

FEDS SEIZE $15 BILLION FROM CAMBODIAN BUSINESS TYCOON LINKED TO GLOBAL CYBER SCAM EMPIRE

Cryptocurrency Seizure
UK Cyber Resilience Under Siege: Record ‘Nationally Significant’ Attacks Expose State Fragility

UK Cyber Resilience Under Siege: Record ‘Nationally Significant’ Attacks Expose State Fragility

Blogging
RANSOMWARE STRIKES MICHIGAN CITY, INDIANA — NEW GROUP “OBSCURA” CLAIMS RESPONSIBILITY FOR 450GB DATA THEFT

RANSOMWARE STRIKES MICHIGAN CITY, INDIANA — NEW GROUP “OBSCURA” CLAIMS RESPONSIBILITY FOR 450GB DATA THEFT

Blogging
Qantas Data Breach Expands: Scattered LAPSUS$ Hunters Leak Exposes 5.7 Million Customers Across Global Airline Network

Qantas Data Breach Expands: Scattered LAPSUS$ Hunters Leak Exposes 5.7 Million Customers Across Global Airline Network

Aviation Security
HARVARD UNIVERSITY / ORACLE E-BUSINESS SUITE BREACH

HARVARD UNIVERSITY / ORACLE E-BUSINESS SUITE BREACH

Blogging
Netherlands Invokes Special Powers Over Chinese-Owned Semiconductor Giant Nexperia

Netherlands Invokes Special Powers Over Chinese-Owned Semiconductor Giant Nexperia

Blogging
BreachForums Seized as Scattered Spider Pushes Salesforce Extortion Campaign

BreachForums Seized as Scattered Spider Pushes Salesforce Extortion Campaign

Blogging
CYBERATTACK IMPACTS CITY OF SUGAR LAND, TEXAS

CYBERATTACK IMPACTS CITY OF SUGAR LAND, TEXAS

Blogging
Payroll Pirates — How Storm-2657 Hijacked University Paychecks Across America

Payroll Pirates — How Storm-2657 Hijacked University Paychecks Across America

Blogging
AI Girlfriend Can’t Keep a Secret: Massive Data Leak Exposes Intimate Chats of 400K+ Users

AI Girlfriend Can’t Keep a Secret: Massive Data Leak Exposes Intimate Chats of 400K+ Users

AI Ethics
China-Linked Hackers Deploy “Nezha” Remote Monitoring Tool in Multi-Nation Espionage Operation

China-Linked Hackers Deploy “Nezha” Remote Monitoring Tool in Multi-Nation Espionage Operation

Asia-Pacific
Teenagers Arrested in England Over Cyberattack on Nursery Chain Kido

Teenagers Arrested in England Over Cyberattack on Nursery Chain Kido

Blogging
Cybercrime crew claims attack on Japanese brewer as it restarts operations

Cybercrime crew claims attack on Japanese brewer as it restarts operations

Blogging
MEDUSA RANSOMWARE DEPLOYS THROUGH FORTRA GOANYWHERE FLAW

MEDUSA RANSOMWARE DEPLOYS THROUGH FORTRA GOANYWHERE FLAW

Blogging
Jaguar Land Rover Restarts Production After Major Cyberattack — An Assault on Britain’s Industrial Heart

Jaguar Land Rover Restarts Production After Major Cyberattack — An Assault on Britain’s Industrial Heart

Automotive Industry
TRJ CYBERSECURITY INTEL REPORT — DISCORD THIRD-PARTY BREACH

TRJ CYBERSECURITY INTEL REPORT — DISCORD THIRD-PARTY BREACH

Blogging
Russia Blocks Mobile Internet for Foreign SIMs — The Digital Iron Curtain Tightens

Russia Blocks Mobile Internet for Foreign SIMs — The Digital Iron Curtain Tightens

Blogging
Wiresexuals” & AI Romance: The New Frontier in Loneliness Meets Code

Wiresexuals” & AI Romance: The New Frontier in Loneliness Meets Code

Artificial Intelligence
FBI and UK Gov’t Issue Urgent Patch Warning After Clop Targets Oracle E-Business Suite

FBI and UK Gov’t Issue Urgent Patch Warning After Clop Targets Oracle E-Business Suite

Blogging
TRJ Cybersecurity Intel Report — CVE-2025-59489: The Unity Engine Exploit

TRJ Cybersecurity Intel Report — CVE-2025-59489: The Unity Engine Exploit

Android Threats
THE CHOKEPOINT TEST: Lewiston–Queenston Wasn’t a Glitch

THE CHOKEPOINT TEST: Lewiston–Queenston Wasn’t a Glitch

Blogging
RAVEN: FLOCK SAFETY’S MOVE FROM WATCHING CARS TO LISTENING TO VOICES

RAVEN: FLOCK SAFETY’S MOVE FROM WATCHING CARS TO LISTENING TO VOICES

Blogging
Salesforce Responds as Scattered Spider Launches New Extortion Site

Salesforce Responds as Scattered Spider Launches New Extortion Site

Blogging
Oracle Links New Extortion Campaign to Bugs Addressed in July Patch

Oracle Links New Extortion Campaign to Bugs Addressed in July Patch

Blogging
Hackers Target Executives With Extortion Emails Claiming Oracle E-Business Suite Breach

Hackers Target Executives With Extortion Emails Claiming Oracle E-Business Suite Breach

Blogging
Millions Impacted by Data Breaches at Allianz Life Insurance and Motility Software

Millions Impacted by Data Breaches at Allianz Life Insurance and Motility Software

Automotive & Dealership Security
Dutch Court Rules Meta Violated European Law by Forcing Profiled Feeds

Dutch Court Rules Meta Violated European Law by Forcing Profiled Feeds

Algorithmic Feeds & AI Systems
Hackers Backtrack After UK Nursery Data Breach Sparks Outrage

Hackers Backtrack After UK Nursery Data Breach Sparks Outrage

Blogging
Lifeprint App Exposes 2 Million Private Photos and Sensitive User Data

Lifeprint App Exposes 2 Million Private Photos and Sensitive User Data

Blogging
1.2 Million People Exposed in WestJet Data Breach Linked to Scattered Spider

1.2 Million People Exposed in WestJet Data Breach Linked to Scattered Spider

Aviation Security
Seniors Targeted in Global Facebook Scam Spreading Android Malware

Seniors Targeted in Global Facebook Scam Spreading Android Malware

AI-Generated Fraud

Posts pagination

1 2 … 9 Next

Independent. Unfiltered. Relentless.

Powered by O.R.I.O.N.

TRJ SYSTEM BOOTING... INITIALIZING SUBSYSTEMS... LINK ESTABLISHED... AWAITING INPUT...
The Realist Juggernaut
Privacy Policy and Legal and Liability Disclaimer / Proudly powered by WordPress Theme: PressBook Grid Dark.

Loading Comments...