Posts

Showing posts from April 8, 2026

Artificial intelligence for cybersecurity: Literature review and future research directions (A Review)

The article  Artificial intelligence for cybersecurity: Literature review and future research directions focuses on the evolving relationship between social engineering and newer technological developments, particularly the role of advanced systems such as AI in amplifying cyber threats. Its main strength lies in expanding the discussion beyond traditional definitions of social engineering and emphasizing how modern technologies increase the scale, realism, and personalization of attacks. This aligns with broader research showing that emerging tools enable more convincing and automated deception, making attacks more effective and harder to detect . Compared to the first article, this paper feels more contemporary and forward-looking, situating social engineering within a rapidly changing technological landscape. In terms of research quality, the article appears stronger and more developed than the first. It engages more directly with current trends and proposes conceptual framewor...

Overview of Social Engineering Attacks on Social Networks: A Review

The article “Overview of Social Engineering Attacks on Social Networks” provides a clear and accessible introduction to the topic of social engineering within online environments. Its main strength lies in its ability to synthesize key concepts such as phishing, manipulation tactics, and the role of human vulnerability into a concise overview. The authors successfully emphasize that social engineering exploits trust rather than technical weaknesses, highlighting an important perspective in cybersecurity discourse. This central argument is well-supported by general observations about the growing prevalence of attacks and their scalability, particularly through automation . Overall, the paper is well-structured and easy to follow, making it suitable as an introductory resource. However, the depth of research presented appears somewhat limited. While the article references established ideas about phishing and user manipulation, it does not engage deeply with empirical data, case studies...

๐Ÿ” Cybersecurity Resources Blog

๐Ÿ” Cybersecurity Resource Blog Introduction Cybersecurity is a rapidly evolving field that requires continuous learning, ethical responsibility, and strong technical foundations. This blog provides key resources and deep explanations of two fundamental concepts every cybersecurity professional must understand: Ethical Hacking and Cryptography . ๐Ÿ›ก️ Ethical Hacking What is Ethical Hacking? Ethical hacking refers to the practice of intentionally probing systems, networks, or applications to identify security vulnerabilities before malicious hackers can exploit them . Unlike cybercriminals, ethical hackers operate with permission and follow legal and ethical guidelines. They are often called “white-hat hackers” , and their primary goal is to improve security by thinking and acting like attackers. Key Principles of Ethical Hacking Authorization : Ethical hackers must have explicit permission from the organization. Scope Definition : Testing must stay within agreed boundaries. Confidentia...