top of page


🕵️♂️ Man-in-the-Middle Attacks: When Someone Is Quietly in the Conversation
This blog explains what a Man-in-the-Middle attack is and how attackers secretly insert themselves into network communications. Once in the middle, traffic can be observed or altered while everything appears to function normally.
Vesna Ergarac
Jan 232 min read


🕵️♂️ ARP Poisoning, Explained with a Simple Metaphor
This blog explains ARP poisoning, showing how attackers mask MAC addresses to redirect network traffic within a local network while the IP address remains unchanged
Vesna Ergarac
Jan 203 min read


Those annoying Smurf attacks (Explained in Plain English)
By ST3MTECH Cybersecurity I want to talk about Smurf attacks as I’ve seen a few in my time (together with DNS cashe poisoning, DHCP attacks and PING of DEATH, but more about those later). With this blog, i hope to help my clients understand in plain English what’s happening to their network, WHY it is happening, and HOW these network attacks can be prevented. So here we go! WHAT exactly is a SMURF attack? Let me ask you this first - ever had someone yell, “DRINKS AT MY HOUS
Vesna Ergarac
Nov 26, 20253 min read
bottom of page
