top of page


📡 Evil Twin Wi-Fi Attacks: When You Trust the Wrong Network
This blog explains how Evil Twin Wi-Fi attacks work by imitating trusted networks and exploiting familiarity rather than force. It shows how a simple connection to the wrong Wi-Fi can quietly expose traffic, credentials, and trust.
Vesna Ergarac
Jan 283 min read


🕵️♂️ ARP Poisoning, Explained with a Simple Metaphor
This blog explains ARP poisoning, showing how attackers mask MAC addresses to redirect network traffic within a local network while the IP address remains unchanged
Vesna Ergarac
Jan 203 min read


DNS Cache Poisoning – when you ring the bell, and no one’s home
Today I want to tell you about something both brilliant and absolutely mean in cybersecurity: DNS cache poisoning. You’re basically being sent to the right street… but the wrong house number . Hold onto your seats — I’m about to take you on a little cyber adventure! :) Let me break this down in plain English — because once you understand this, you’ll never look at the internet the same way again. Every website you visit has a “street name” (the domain) and a “house number” (
Vesna Ergarac
Dec 9, 20252 min read


Malware 101: The Digital Threats You Need to Know
When people think of “malware,” they often imagine a computer virus — but malware is a much broader family of malicious software. It...
Vesna Ergarac
Sep 25, 20253 min read


How Many Cyber Attacks Are Out There? (Spoiler: Too Many!!)
From phishing scams to full-blown ransomware dramas, the internet is crawling with shady characters. Spoiler alert: there are way too many cyber attacks to count - but knowing their tricks is your first line of defence.
Vesna Ergarac
Sep 25, 20253 min read


ST3MTech Red Flag Series: Volume 1
From fake romances to emotional blackmail, Red Flag Series: Volume 1 breaks down the most common manipulation tactics used in scams and toxic relationships. Drawing on insights from forensic psychology and cybercrime cases, this volume helps you spot the warning signs early — and walk away smarter, stronger, and scam-proof.
Vesna Ergarac
May 22, 20255 min read
bottom of page
