top of page


🕵️♂️ Man-in-the-Middle Attacks: When Someone Is Quietly in the Conversation
This blog explains what a Man-in-the-Middle attack is and how attackers secretly insert themselves into network communications. Once in the middle, traffic can be observed or altered while everything appears to function normally.
Vesna Ergarac
Jan 232 min read


🕵️♂️ ARP Poisoning, Explained with a Simple Metaphor
This blog explains ARP poisoning, showing how attackers mask MAC addresses to redirect network traffic within a local network while the IP address remains unchanged
Vesna Ergarac
Jan 203 min read
bottom of page
