top of page


Recent Russian hacks on Dutch public infrastructure
Article Written by: Aryan Singh Article Designed by: Aryan Singh & Sanvi Desai What comes to mind when you hear the word “cyberattack”? When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in
Aryan Singh
1 day ago3 min read


Thinking Like An Attacker: How Social Engineering Works
Article Written by: Avni Sharma Article Designed by: Avni Sharma and Natasha Gumpula Phishing is one of the most common forms of cyberattacks today, and it often sounds surprisingly realistic. Attackers craft emails or messages that look legitimate, convincing victims to click links, share sensitive information, or even transfer money. This is part of a broader strategy known as social engineering, where criminals use psychological tactics to gain trust and manipulate people
Avni Sharma
3 days ago2 min read


Nvidia and OpenAI: An Alliance for the Future
Article Written by: Jia Fletcher Article Designed by: Jia Fletcher & Sanvi Desai Over 90% of leading businesses utilize AI. Artificial intelligence has become a prominent force in our everyday lives, making its way into businesses and homes alike. Now, two leading companies in the artificial intelligence industry– Nvidia and OpenAI –have just made history. On September 22, 2025 , Nvidia and OpenAI publicly announced their partnership. The two companies both have significant
Jia Fletcher
Feb 113 min read


The Hidden Life of Your Data: What Apps Really do Behind the Scenes
Article Written By: Chintana Bhaskara Article Designed By: Chintana Bhaskara and Natasha Gumpula Hidden Data Flow A study shows that of the 297 popular health and fitness apps , found that there are about 8 different permissions asked, including sensitive information like your location or device information. Even though most apps state that they don’t share your data with outside sources, it has shown to be untrue. Grund, Held & Bero states that researchers have discovered t
Chintana Bhaskara
Feb 103 min read
bottom of page
