top of page
Search


What happens after the click? – Part 1 – Fake CAPTCHA
Recently, we ran several cybersecurity awareness initiatives and phishing simulations. Throughout these projects, we interacted with stakeholders across a wide range of technical backgrounds. A recurring question we encountered was: "What actually happens after someone clicks a malicious link?"—often followed by variations like "What if I click but don’t enter any information?" or "What if I enter fake data?"
To proactively address these questions, we decided to launch thi

Matei
Aug 5, 2025


IoT Hacking Challenge Walkthrough - RTSP TO HTTP
Entering the HiveHack room at CyberSea, I was immediately impressed by the densely packed array of challenges ranging from door hijacking and lockpicking to intricate puzzles all meticulously crafted by HackHive. After systematically working through several tasks, my focus shifted to the multimedia streaming challenge. Unlike the others, this task remained untouched, offering a distinct and technically engaging opportunity involving an IP camera and an older Samsung smart TV.

Matei
Jul 27, 2025


Unlocking Cybersecurity: The Math Behind Cryptography and Data Protection
Cryptography stands as the bedrock of data security, acting as a safeguard for information across various industries. This blog post...

Anne
Apr 1, 2025
bottom of page