top of page
Search


What happens after the click? – Part 1 – Fake CAPTCHA
Recently, we ran several cybersecurity awareness initiatives and phishing simulations. Throughout these projects, we interacted with stakeholders across a wide range of technical backgrounds. A recurring question we encountered was: "What actually happens after someone clicks a malicious link?"—often followed by variations like "What if I click but don’t enter any information?" or "What if I enter fake data?"
To proactively address these questions, we decided to launch thi

Matei
Aug 58 min read
Â
Â
Â


IoT Hacking Challenge Walkthrough - RTSP TO HTTP
Entering the HiveHack room at CyberSea, I was immediately impressed by the densely packed array of challenges ranging from door hijacking and lockpicking to intricate puzzles all meticulously crafted by HackHive. After systematically working through several tasks, my focus shifted to the multimedia streaming challenge. Unlike the others, this task remained untouched, offering a distinct and technically engaging opportunity involving an IP camera and an older Samsung smart TV.

Matei
Jul 275 min read
Â
Â
Â


Unlocking Cybersecurity: The Math Behind Cryptography and Data Protection
Cryptography stands as the bedrock of data security, acting as a safeguard for information across various industries. This blog post...

Anne
Apr 15 min read
Â
Â
bottom of page