top of page



How I Built an AI-Powered Phishing Defense Platform from Scratch
By Anveeksh Mahesh Rao | MS Cybersecurity Researcher | Northeastern University, Khoury College of Computer Sciences Introduction Phishing continues to be one of the most effective cyberattack techniques in modern cybersecurity. Despite advances in security awareness training, browser protections, and enterprise filtering systems, attackers continue to compromise users through deceptive login pages, impersonation campaigns, malicious redirects, and credential harvesting attack
raoanveeksh
12 hours ago6 min read


How to Build a Cybersecurity Portfolio That Gets You Hired
By Anveeksh Mahesh Rao (Ish) | Cybersecurity Specialist · Educator · Founder, niyantraX If you're trying to break into cybersecurity or level up from where you are you've probably heard the same advice over and over: get certified, apply everywhere, and network on LinkedIn. And while that's not wrong, there's one thing most people overlook that can make or break your job search. Your portfolio. Not your resume. Not your LinkedIn. Your portfolio is the place where you prove, w
raoanveeksh
Apr 266 min read


HoneyTrap Lab: Deploying a Production-Grade SSH Honeypot to Catch Real Attackers
Category: Threat Intelligence / Blue Team
Tools: Cowrie, Ubuntu 24.04, iptables, Python 3.12, MITRE ATT&CK
GitHub: github.com/anveeksh/honeytrap-lab
Date: March 2026
raoanveeksh
Mar 45 min read


Understanding the Rise of Phishing Attacks and Human Vulnerability in Cybersecurity
In today's digital age, phishing attacks are a growing threat. With advancements in technology, cybercriminals are devising more clever tactics to deceive users. Phishing attacks aim to trick people into disclosing sensitive information like passwords or financial data. Despite our intelligence, many still become victims of these scams. Let's dive into the factors driving the rise of phishing attacks and why human errors contribute to their success.
raoanveeksh
Oct 24, 20254 min read


Understanding the Impacts of the October 2025 AWS Outage in N Virginia on Businesses
What the Huge AWS Outage Reveals About the Internet
raoanveeksh
Oct 20, 20254 min read


F5 Inc Faces Major Cybersecurity F5 Data Breach Linked to Chinese Threat Actors
In October 2025, F5, Inc., a key player in application services and security, became the focus of a major cybersecurity breach. This serious incident, tied to a threat actor linked to China, has triggered significant concern throughout the tech industry and beyond. As more organizations depend on digital infrastructure, the repercussions of such breaches can reach far beyond immediate financial costs, impacting trust, reputation, and operational stability.
raoanveeksh
Oct 19, 20254 min read


The Future of Cybersecurity: How AI is Transforming Digital Defense in 2025
The cybersecurity landscape is changing faster than ever, and artificial intelligence (AI) is at the heart of this transformation. From real-time threat detection to automated incident response, AI and machine learning are now redefining how we defend digital infrastructure.
In 2025, the convergence of AI and cybersecurity is not just a trend; it’s the foundation of modern digital defence. Let’s explore how AI is reshaping this ecosystem, the benefits, the risks, and what the
raoanveeksh
Oct 18, 20253 min read


Tech Giants Lay Off Thousands as AI Accelerates Workforce Changes
the future of work feels uncertain, history has shown that societies have continually adapted to technological revolutions. The integration of AI will undoubtedly continue, but with proactive preparation, lifelong learning, and policy-level support, humanity can transform this challenge into a period of progress.
raoanveeksh
Jun 30, 20253 min read


16 Billion Login Credentials Leaked in Historic Cyber Breach: Global Security at Risk
© Image generated by - Anveeksh Mahesh Rao June 20, 2025 | By Anveeksh Mahesh Rao In what experts are calling the biggest credential leak...
raoanveeksh
Jun 19, 20252 min read


Is Your Long-Distance Relationship at Risk? Cybersecurity Concerns for Online Intimacy
In the digital age, technology has reshaped how people connect, including their intimate relationships. Long-distance couples often rely on
raoanveeksh
Feb 23, 20253 min read


Is It Worth Doing CEH If You Have a Bachelor’s in Cybersecurity?
In the field of cybersecurity, certifications like the Certified Ethical Hacker (CEH) are often seen as valuable for enhancing a...
raoanveeksh
Nov 29, 20243 min read


How a Phishing Attack Almost Destroyed a Business—And How We Stopped It
In the modern technological age, cyberattacks represent an ongoing exposure to all businesses—large and small. One of the most common and...
raoanveeksh
Sep 6, 20244 min read


Social Engineering: What It Is and How to Protect Yourself
In today’s digital age, we are more connected than ever before. While this has brought many benefits, it has also exposed us to new risks. O
raoanveeksh
Apr 4, 20232 min read


Is Digital India under Cyber Attack ?
In the field of innovation, both the private and public sectors play critical roles. By making internet-based services and online usage more
raoanveeksh
Apr 1, 20235 min read


What is Ransomware? How to protect ourselves from this type of attack?
A form of malicious software called ransomware encrypts the data or files of a victim and demands money in return for the decryption key. It
raoanveeksh
Mar 30, 20234 min read


How can we protect our phone from hackers?
here is the tips to get secure from the hackers.
raoanveeksh
Feb 21, 20231 min read


What is the Data Breach?
A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment. Data breaches can...
raoanveeksh
Dec 6, 20224 min read


Cyber Crime & Hacking introduction .
It’s an unlawful act wherein the computer is either a tool or a target or both any illegal act involving a computer, its systems, or its app
raoanveeksh
Sep 21, 20223 min read


Where can I get valuable time to study and get an internship in IT organizations?
Many of us register in certificate programs, but we are unable to secure an internship since our abilities and the organization's...
raoanveeksh
Aug 28, 20221 min read


What is Cyber Law & Why Cyber Law Matters ?
Let us know about Cyber Crime first. cybercrime, also called computer crime, is the use of a computer as an instrument to further illegal...
raoanveeksh
Aug 22, 202212 min read
bottom of page