top of page


Rogue DHCP Servers: When the Network Trusts the Wrong Authority
When a network blindly trusts the wrong authority, attackers don’t need to break in - they’re invited. Rogue DHCP servers exploit one of the most trusted services on a network, quietly redirecting traffic, assigning malicious gateways, and enabling chained attacks like DNS cache poisoning. Understanding how this works is critical to defending modern networks.
Vesna Ergarac
54 minutes ago2 min read


DNS Cache Poisoning – when you ring the bell, and no one’s home
Today I want to tell you about something both brilliant and absolutely mean in cybersecurity: DNS cache poisoning. You’re basically being sent to the right street… but the wrong house number . Hold onto your seats — I’m about to take you on a little cyber adventure! :) Let me break this down in plain English — because once you understand this, you’ll never look at the internet the same way again. Every website you visit has a “street name” (the domain) and a “house number” (
Vesna Ergarac
Dec 9, 20252 min read


Those annoying Smurf attacks (Explained in Plain English)
By ST3MTECH Cybersecurity I want to talk about Smurf attacks as I’ve seen a few in my time (together with DNS cashe poisoning, DHCP attacks and PING of DEATH, but more about those later). With this blog, i hope to help my clients understand in plain English what’s happening to their network, WHY it is happening, and HOW these network attacks can be prevented. So here we go! WHAT exactly is a SMURF attack? Let me ask you this first - ever had someone yell, “DRINKS AT MY HOUS
Vesna Ergarac
Nov 26, 20253 min read


Narrative, Hook, Exploit: The Secret Playbook of Cyber Fraudsters🎭
If you think scams are about dodgy emails and bad grammar, think again. The real power of cyber fraud isn’t in the code — it’s in the...
Vesna Ergarac
Sep 29, 20253 min read


Encryption 101: Your Data’s First Line of Defense 🔐
Encryption isn’t just for techies — it’s your data’s first line of defense against hackers, snoops, and digital drama. From fast locks to fancy key pairs, this blog breaks down the methods that keep your secrets safe.
Vesna Ergarac
Sep 29, 20252 min read


SHA Family Basics 101: What You Need to Know About Secure Hashing 🔐
From SHA-1 to SHA-3, the Secure Hash Algorithm family shows how fast ‘safe’ can become obsolete. Learn why hashing still matters today — and how it keeps your data one step ahead of attackers
Vesna Ergarac
Sep 27, 20252 min read


Password Attacks 101: Brute Force, Guessing, and Cracking Explained
Passwords are still the easiest way in for attackers, and brute force, guessing, and cracking techniques make short work of weak ones. This guide shows how these attacks really work — and the survival skills small businesses need to stay secure.
Vesna Ergarac
Sep 27, 20252 min read


Malware 101: The Digital Threats You Need to Know
When people think of “malware,” they often imagine a computer virus — but malware is a much broader family of malicious software. It...
Vesna Ergarac
Sep 25, 20253 min read


How Many Cyber Attacks Are Out There? (Spoiler: Too Many!!)
From phishing scams to full-blown ransomware dramas, the internet is crawling with shady characters. Spoiler alert: there are way too many cyber attacks to count - but knowing their tricks is your first line of defence.
Vesna Ergarac
Sep 25, 20253 min read


The Password Siren: When Social Engineering Sounds Sweet
This blog exposes how hackers use social engineering — charm, confidence, and urgency — to trick people into handing over passwords without realizing it. It warns readers that hackers don’t always steal credentials with code; sometimes, they simply ask nicely and get them
Vesna Ergarac
Sep 6, 20252 min read


Emotional Baiting 101: When Help Isn’t Help — It’s a Hook
By Vesna Ergarac | ST3MTECH Consulting In the world of scam detection, cybersecurity, and psychological manipulation, there’s one tactic...
Vesna Ergarac
Aug 2, 20253 min read


🚩Red Flag Series: Volume 3 — The Scammer's Playbook🚩
I’ve been watching some interesting Netflix series lately — the kind that dive into scammers, the tools they use, and the digital mess...
Vesna Ergarac
Jul 21, 20257 min read


🚩 ST3MTech Red Flag Series: Volume 3 — Teaser Drop 🚩
Red Flags are now dropping — follow the Playbook here: 🚩Red Flag Series: Volume 3 — The Scammer's Playbook🚩 This is where we decode the...
Vesna Ergarac
Jul 19, 20251 min read


Cyber Insurance: What They Don't Tell You (Until You Try to Claim)
Cyber insurance sounds like a safety net, but the real shocks often come when you try to claim. Here’s what providers won’t tell you upfront - and why you need to read the fine print like your business depends on it
Vesna Ergarac
Jun 22, 20253 min read


ST3MTech Red Flag Series: Volume 2
After a welcome response to Volume 1 of the ST3MTech Red Flag Series , it became crystal clear to me that this isn’t just a fun analogy...
Vesna Ergarac
Jun 4, 20255 min read


Forget Real Phishing. Catfishing With AI Is All The Rage
Welcome to the era of synthetic soulmates, cloned charm, and chat-bots who say "I love you" better than your ex ever did. I used to think...
Vesna Ergarac
Jun 2, 20253 min read


When the Server’s Not the Only Thing Ignoring You
A Tech Woman’s Guide to Staying Sane, Sharp & Savage I want to talk about something I call “ digital gaslighting” — where you’re seen...
Vesna Ergarac
Jun 1, 20252 min read


🚩 ST3MTech Red Flag Series: Volume 2 — Teaser Drop 🚩
In Volume 1 , we decoded the emotional malware: gaslighters, love-bombers, ghosters, and more. But the system audit ain’t over yet!☺️. In...
Vesna Ergarac
May 31, 20251 min read


ST3MTech Red Flag Series: Volume 1
From fake romances to emotional blackmail, Red Flag Series: Volume 1 breaks down the most common manipulation tactics used in scams and toxic relationships. Drawing on insights from forensic psychology and cybercrime cases, this volume helps you spot the warning signs early — and walk away smarter, stronger, and scam-proof.
Vesna Ergarac
May 22, 20255 min read


Cyber Resilience: Why Small Businesses Can’t Afford to Ignore It
Here At ST3MTech , we don’t just provide cybersecurity - we build strong digital foundations that help small and medium businesses...
Vesna Ergarac
May 21, 20251 min read
bottom of page
