Skip to main content

Posts

 Understanding Phishing and Social Engineering in Today's Digital World In our increasingly connected world, cybercriminals have perfected the art of manipulation. They don't need to break down digital walls when they can simply trick you into opening the door. This is the essence of phishing and social engineering attacks that exploit human psychology rather than technical vulnerabilities. As one study notes, phishing emails utilize social engineering tactics to infuse a sense of urgency or fear in users, prompting them to take immediate action without verifying the message's authenticity . What is Phishing? The Digital Bait and Switch Phishing is a cyberattack where fraudsters send deceptive communications that appear to come from legitimate sources. The goal is simple: deceive recipients into disclosing sensitive information such as passwords, credit card numbers, or personal details, or into clicking on malicious links or downloading malware . Think of it as digital fis...
Recent posts

Navigating Cloud Security - M-Tiba Case Study (Part 2)

  Disclaimer.  The views, assessments, and observations presented in this article are provided strictly for educational and analytical purposes, based on publicly available information and professional expertise. Defthon is not affiliated with, funded by, or acting on behalf of M-TIBA, any of its partners, competitors, government agencies, or any other stakeholder mentioned or implied. This analysis is vendor-neutral and non-partisan. It does not seek to assign blame, validate unverified claims, or reach definitive conclusions while official investigations are ongoing. All references to entities, systems, or potential impacts are intended solely to support high-level risk awareness, resilience building, and the advancement of cybersecurity best practices. Still referring to the case of  M-TIBA, the platform likely operates on a hybrid infrastructure with services distributed across multiple environments, including different cloud providers with diverse underlying technolo...

Cybersecurity in a Hybrid Health-Fintech - A case of M-TIBA (White Paper Series - Part 1)

Disclaimer. The views, assessments, and observations presented in this article are provided strictly for educational and analytical purposes, based on publicly available information and professional expertise. Defthon is not affiliated with, funded by, or acting on behalf of M-TIBA, any of its partners, competitors, government agencies, or any other stakeholder mentioned or implied. This analysis is vendor-neutral and non-partisan. It does not seek to assign blame, validate unverified claims, or reach definitive conclusions while official investigations are ongoing. All references to entities, systems, or potential impacts are intended solely to support high-level risk awareness, resilience building, and the advancement of cybersecurity best practices. Background Few weeks ago the news on M-TIBA PHI data leaked was all over where hackers claimed  to have stolen approx. 2.15 TB of data (17 million-plus files). M-Tiba is a mobile health wallet (Digital health financing platform) de...

Welcome to the Defthon Blog!

You’ve just stepped into the Defthon Blog — a space dedicated to continuous cybersecurity and digital defense.  “Defthon” stands for Defence Marathon , reflecting our mission of staying vigilant, proactive, and always learning in the fast-paced world of cybersecurity. Here, we share: Insights on protecting digital assets and networks. Tips, tutorials, and best practices for continuous security. Updates on emerging threats and trends in cybersecurity. Cybersecurity opportunities.  Defence Strategies.  Hackathons and CTFs Whether you’re a cybersecurity professional, a tech enthusiast, or someone curious about digital defense, this blog is your go-to resource for non-stop learning and protection . Join us on this marathon of defense, stay informed, and keep your digital world secure! The Defthon Team