Cyber Insights

Explore my findings in cybersecurity and ethical hacking through visuals.

A laptop displaying a blog or webpage with images and text, sitting on a white table accompanied by a wireless mouse.
A laptop displaying a blog or webpage with images and text, sitting on a white table accompanied by a wireless mouse.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
A laptop is placed on a small wooden table in a room with light-colored carpet and vertical blinds. The laptop screen displays a webpage titled 'Interactive RFID', indicating a focus on technology.
A laptop is placed on a small wooden table in a room with light-colored carpet and vertical blinds. The laptop screen displays a webpage titled 'Interactive RFID', indicating a focus on technology.
A dimly lit room features a desktop monitor and a laptop on a desk, both displaying lines of code and digital graphics. The primary focus is on programming and software development, with a dark, tech-centric theme.
A dimly lit room features a desktop monitor and a laptop on a desk, both displaying lines of code and digital graphics. The primary focus is on programming and software development, with a dark, tech-centric theme.

Contact Us

A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.

Reach out to share your thoughts, questions, or collaborations in cybersecurity and ethical hacking.