Author: ferry0x13

  • I remember back when I was a kid, before unlimited voice and data plans became the norm, recharging a SIM wasn’t something you could do in a few taps. You’d walk into a small grocery or telecom shop, get your… Read More

    The Code That Can Steal Your Calls
  • You’re preparing for an interview at a company you’ve been wanting to join for months. After applying online, someone from the hiring team reaches out to you on WhatsApp. They introduce themselves as a recruiter and say they’d like to… Read More

    The Job Interview That Turned Into a Microsoft Phishing Attack
  • In some of our previous posts, we spoke about how sophisticated phishing emails use typo-squatting to visually trick users into mistaking malicious domains as legitimate, for example, using ‘rn’ instead of an ‘m’, using ‘1’ instead of an ‘i’, etc.,… Read More

    They Look Identical. Only One Is Safe
  • LinkedIn, over the past few years, has transitioned from a platform allowing job searching and connections, to a platform for building a social and professional presence. And just like any other social media platform, it has become an important place… Read More

    The ‘Engagement-Farming’ problem with LinkedIn and related Security Concerns
  • Every now and then, we read all these articles on social engineering and conclude we’re too smart to be fooled. And then, a new scenario pops up that puts a shock through our cells, making us believe otherwise. Social Engineering… Read More

    The Kindness Hack: How Social Engineering Really Works
  • WhatsApp is having a tough time again. A lot of people advocate for the use of privacy focused apps such as Telegram or Signal over Whatsapp. Even though people believe WhatsApp’s security features can be hardened by tweaking some settings,… Read More

    A single WhatsApp group can get you hacked
  • In the last few years we have seen huge progress in technology and security tools. Still, some of the oldest tricks continue to work because people are not always aware of how these scams operate. One example that has become… Read More

    Too Good To Be True Car Deals
  • Ever since AI came out to the surface and eventually became a part of our daily lives, I have been wondering the threats that come along with it, as I am sure many of you reading this have thought about… Read More

    AI and Cybersecurity in the Modern Digital World
  • Copy and paste is a habit everyone uses dozens of times a day. That habit is exactly what attackers exploit in modern campaigns that combine fake CAPTCHA pages, clipboard manipulation, and information stealer malware. In one common flow, a visitor… Read More

    Clipboard Hijacking and Fake CAPTCHA Threats Explained
  • This post isn’t an awareness piece or a guide that everyone might find useful. It’s more of a personal log, a part of “my journey” category, where I document what I’m learning as I go. I’m currently exploring a TryHackMe… Read More

    Detecting Web Attacks