top of page


🔥 Hot Wallets: When Convenience Gets Costly
This blog explores hot wallets, why they’re so convenient, how they’re commonly compromised, and why most crypto losses don’t start with “blockchain hacks” at all. It breaks down the technical and human factors behind hot wallet risk, without fear or hype.
Vesna Ergarac
Feb 13 min read


📡 Evil Twin Wi-Fi Attacks: When You Trust the Wrong Network
This blog explains how Evil Twin Wi-Fi attacks work by imitating trusted networks and exploiting familiarity rather than force. It shows how a simple connection to the wrong Wi-Fi can quietly expose traffic, credentials, and trust.
Vesna Ergarac
Jan 283 min read


🕵️♂️ Man-in-the-Middle Attacks: When Someone Is Quietly in the Conversation
This blog explains what a Man-in-the-Middle attack is and how attackers secretly insert themselves into network communications. Once in the middle, traffic can be observed or altered while everything appears to function normally.
Vesna Ergarac
Jan 232 min read


🕵️♂️ ARP Poisoning, Explained with a Simple Metaphor
This blog explains ARP poisoning, showing how attackers mask MAC addresses to redirect network traffic within a local network while the IP address remains unchanged
Vesna Ergarac
Jan 203 min read


Rogue DHCP Servers: When the Network Trusts the Wrong Authority
When a network blindly trusts the wrong authority, attackers don’t need to break in - they’re invited. Rogue DHCP servers exploit one of the most trusted services on a network, quietly redirecting traffic, assigning malicious gateways, and enabling chained attacks like DNS cache poisoning. Understanding how this works is critical to defending modern networks.
Vesna Ergarac
Jan 162 min read


DNS Cache Poisoning – when you ring the bell, and no one’s home
Today I want to tell you about something both brilliant and absolutely mean in cybersecurity: DNS cache poisoning. You’re basically being sent to the right street… but the wrong house number . Hold onto your seats — I’m about to take you on a little cyber adventure! :) Let me break this down in plain English — because once you understand this, you’ll never look at the internet the same way again. Every website you visit has a “street name” (the domain) and a “house number” (
Vesna Ergarac
Dec 9, 20252 min read


Those annoying Smurf attacks (Explained in Plain English)
By ST3MTECH Cybersecurity I want to talk about Smurf attacks as I’ve seen a few in my time (together with DNS cashe poisoning, DHCP attacks and PING of DEATH, but more about those later). With this blog, i hope to help my clients understand in plain English what’s happening to their network, WHY it is happening, and HOW these network attacks can be prevented. So here we go! WHAT exactly is a SMURF attack? Let me ask you this first - ever had someone yell, “DRINKS AT MY HOUS
Vesna Ergarac
Nov 26, 20253 min read


Password Attacks 101: Brute Force, Guessing, and Cracking Explained
Passwords are still the easiest way in for attackers, and brute force, guessing, and cracking techniques make short work of weak ones. This guide shows how these attacks really work — and the survival skills small businesses need to stay secure.
Vesna Ergarac
Sep 27, 20252 min read


Malware 101: The Digital Threats You Need to Know
When people think of “malware,” they often imagine a computer virus — but malware is a much broader family of malicious software. It...
Vesna Ergarac
Sep 25, 20253 min read


How Many Cyber Attacks Are Out There? (Spoiler: Too Many!!)
From phishing scams to full-blown ransomware dramas, the internet is crawling with shady characters. Spoiler alert: there are way too many cyber attacks to count - but knowing their tricks is your first line of defence.
Vesna Ergarac
Sep 25, 20253 min read
bottom of page
