top of page


šPart 2: Crypto Seed Phrasesš
This blog explores crypto seed phrases - what they are, how they work, and why they represent a single point of failure in crypto ownership. It explains how seed phrases are commonly compromised and why human behaviour, not broken cryptography, is usually the real risk.
Vesna Ergarac
Feb 94 min read
Ā


š„Ā Hot Wallets: When Convenience Gets Costly
This blog explores hot wallets, why theyāre so convenient, how theyāre commonly compromised, and why most crypto losses donāt start with āblockchain hacksā at all. It breaks down the technical and human factors behind hot wallet risk, without fear or hype.
Vesna Ergarac
Feb 13 min read
Ā


š”Ā Evil Twin Wi-Fi Attacks: When You Trust the Wrong Network
This blog explains how Evil Twin Wi-Fi attacks work by imitating trusted networks and exploiting familiarity rather than force. It shows how a simple connection to the wrong Wi-Fi can quietly expose traffic, credentials, and trust.
Vesna Ergarac
Jan 283 min read
Ā


šµļøāāļøĀ Man-in-the-Middle Attacks: When Someone Is Quietly in the Conversation
This blog explains what a Man-in-the-Middle attack is and how attackers secretly insert themselves into network communications. Once in the middle, traffic can be observed or altered while everything appears to function normally.
Vesna Ergarac
Jan 232 min read
Ā


šµļøāāļøĀ ARP Poisoning, Explained with a Simple Metaphor
This blog explains ARP poisoning, showing how attackers mask MAC addresses to redirect network traffic within a local network while the IP address remains unchanged
Vesna Ergarac
Jan 203 min read
Ā


Rogue DHCP Servers: When the Network Trusts the Wrong Authority
When a network blindly trusts the wrong authority, attackers donāt need to break in - theyāre invited. Rogue DHCP servers exploit one of the most trusted services on a network, quietly redirecting traffic, assigning malicious gateways, and enabling chained attacks like DNS cache poisoning. Understanding how this works is critical to defending modern networks.
Vesna Ergarac
Jan 162 min read
Ā


DNS Cache Poisoning ā when you ring the bell, and no oneās home
Today I want to tell you about something both brilliant and absolutely mean Ā in cybersecurity: DNS cache poisoning. Youāre basically being sent to the right street⦠but the wrong house number . Hold onto your seats ā Iām about to take you on a little cyber adventure! :) Let me break this down in plain English ā because once you understand this, youāll never look at the internet the same way again. Every website you visit has a āstreet nameā (the domain) and a āhouse numberā (
Vesna Ergarac
Dec 9, 20252 min read
Ā


Those annoying Smurf attacks (Explained in Plain English)
By ST3MTECH Cybersecurity I want to talk about Smurf attacks as Iāve seen a few in my time (together with DNS cashe poisoning, DHCP attacks and PING of DEATH, but more about those later). With this blog, i hope to help my clients understand in plain English whatās happening to their network, WHY it is happening, and HOW these network attacks can be prevented. So here we go! WHAT exactly is a SMURF attack? Let me ask you this first - ever had someone yell, āDRINKS AT MY HOUS
Vesna Ergarac
Nov 26, 20253 min read
Ā


Narrative, Hook, Exploit: The Secret Playbook of Cyber Fraudstersš
If you think scams are about dodgy emails and bad grammar, think again. The real power of cyber fraud isnāt in the code ā itās in the...
Vesna Ergarac
Sep 29, 20253 min read
Ā


Encryption 101: Your Dataās First Line of Defense š
Encryption isnāt just for techies ā itās your dataās first line of defense against hackers, snoops, and digital drama. From fast locks to fancy key pairs, this blog breaks down the methods that keep your secrets safe.
Vesna Ergarac
Sep 29, 20252 min read
Ā


SHA Family Basics 101: What You Need to Know About Secure Hashing š
From SHA-1 to SHA-3, the Secure Hash Algorithm family shows how fast āsafeā can become obsolete. Learn why hashing still matters today ā and how it keeps your data one step ahead of attackers
Vesna Ergarac
Sep 27, 20252 min read
Ā


Password Attacks 101: Brute Force, Guessing, and Cracking Explained
Passwords are still the easiest way in for attackers, and brute force, guessing, and cracking techniques make short work of weak ones. This guide shows how these attacks really work ā and the survival skills small businesses need to stay secure.
Vesna Ergarac
Sep 27, 20252 min read
Ā


Malware 101: The Digital Threats You Need to Know
When people think of āmalware,ā they often imagine a computer virus ā but malware is a much broader family of malicious software. It...
Vesna Ergarac
Sep 25, 20253 min read
Ā


How Many Cyber Attacks Are Out There? (Spoiler: Too Many!!)
From phishing scams to full-blown ransomware dramas, the internet is crawling with shady characters. Spoiler alert: there are way too many cyber attacks to count - but knowing their tricks is your first line of defence.
Vesna Ergarac
Sep 25, 20253 min read
Ā


The Password Siren: When Social Engineering Sounds Sweet
This blog exposes how hackers use social engineering ā charm, confidence, and urgency ā to trick people into handing over passwords without realizing it. It warns readers that hackers donāt always steal credentials with code; sometimes, they simply ask nicely and get them
Vesna Ergarac
Sep 6, 20252 min read
Ā


Emotional Baiting 101: When Help Isnāt Help ā Itās a Hook
By Vesna Ergarac | ST3MTECH Consulting In the world of scam detection, cybersecurity, and psychological manipulation, thereās one tactic...
Vesna Ergarac
Aug 2, 20253 min read
Ā


š©Red Flag Series: Volume 3 ā The Scammer's Playbookš©
Iāve been watching some interesting Netflix series lately ā the kind that dive into scammers, the tools they use, and the digital mess...
Vesna Ergarac
Jul 21, 20257 min read
Ā


š© ST3MTech Red Flag Series: Volume 3 ā Teaser Drop š©
Red Flags are now dropping ā follow the Playbook here: š©Red Flag Series: Volume 3 ā The Scammer's Playbookš© This is where we decode the...
Vesna Ergarac
Jul 19, 20251 min read
Ā


Cyber Insurance: What They Don't Tell You (Until You Try to Claim)
Cyber insurance sounds like a safety net, but the real shocks often come when you try to claim. Hereās what providers wonāt tell you upfront - and why you need to read the fine print like your business depends on it
Vesna Ergarac
Jun 22, 20253 min read
Ā


ST3MTech Red Flag Series: Volume 2
After a welcome response to Volume 1 of the ST3MTech Red Flag Series , it became crystal clear to me that this isnāt just a fun analogy...
Vesna Ergarac
Jun 4, 20255 min read
Ā
bottom of page
