Cyber Samir
@cybersamir.bsky.social
6 followers
11 following
110 posts
Exploring Hacking, Penetration Testing, and Cybersecurity
“No technology that’s connected to the Internet is unhackable.
Posts
Media
Videos
Starter Packs
Cyber Samir
@cybersamir.bsky.social
· Oct 3
The Dark Reality of Cybercrime in Nepal: Telegram Leaks & Black Markets
As a cybersecurity researcher in Nepal, I have spent years tracking the evolution of digital threats. For a long time, the dangers were relatively straightforward: simple phishing emails, basic scams, and the occasional website defacement. But as I stand here in late 2025, I am witnessing a disturbing and rapid transformation. The landscape has shifted from isolated incidents to a sophisticated, organized, and deeply malicious underground economy.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Oct 3
Becoming a Black Hat Hacker: Risks, Consequences & Reality
What Happens If You Become a Black Hat Hacker? The Risks & Reality In our community, I see a spark in the eyes of many young, talented individuals. It’s a spark of curiosity, a desire to understand systems so deeply that you can make them do things their creators never intended. This is the heart of a hacker. But where you direct that spark—towards building and protecting, or towards breaking and stealing—is a choice that will define your entire life.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Oct 2
Top Android Hacking Techniques Used by Cybercriminals
Android, powering over 3 billion active devices globally, is the world’s most widely used mobile operating system. Its popularity and open ecosystem make it a prime target for cybercriminals seeking to steal sensitive data, perpetrate financial fraud, or conduct espionage. In Nepal, where mobile adoption is surging across sectors like e-commerce, banking, and education, understanding these threats is critical. As Samir KC, founder of CyberSamir (cybersamir.com), I am committed to equipping individuals and businesses with the knowledge to defend against these attacks.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 27
Cyber Security in Nepal: Ultimate 2025 Guide for Protection & Awareness
Cyber Security in Nepal: The Ultimate 2025 Guide Nepal is in the middle of a digital revolution. From ordering food online and paying bills with a tap on eSewa or Khalti, to the government's ambitious National ID project, our nation is rapidly moving online. This digital transformation is exciting, bringing new opportunities and conveniences. But it also opens a new front door for a different kind of threat—one that operates silently in the world of ones and zeros.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 24
Keyloggers Explained: How They Steal Your Keystrokes and How to Stop Them
Hello readers It's Samir , and today we're diving into a threat that's as sneaky as it is dangerous: keyloggers. Imagine someone looking over your shoulder, recording every single thing you type passwords, bank details, private messages, everything. That's exactly what a keylogger does, but from the shadows of your own device. In this article, we'll break down what keyloggers are, how they manage to steal your keystrokes, and most importantly, how you can protect yourself from this invasive threat.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 23
What Is a DDoS Attack? Understanding How Botnets Overwhelm Websites
A DDoS attack is a cybercrime where an attacker floods a server, website, or network with a massive amount of malicious internet traffic to overwhelm it and make it unavailable to legitimate users. Think of it like a coordinated traffic jam that clogs a highway, preventing real cars from getting to their destination. The "distributed" part means the attack traffic comes from many different sources, making it difficult to stop.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 23
Best Web Hosting Providers in Nepal – Top Hosting Services Compared
Best Web Hosting Providers in Nepal Explore the top web hosting providers in Nepal for 2025, offering reliable, secure, and fast hosting solutions for personal, business, and cybersecurity-related websites. ⚠️Security Alert: Ensure your hosting provider offers robust security features like SSL certificates and DDoS protection to safeguard sensitive data, especially for cybersecurity-related websites. Introduction to Web Hosting in Nepal Nepal’s digital landscape is rapidly expanding, with businesses, educational institutions, and individuals increasingly relying on online platforms.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 23
What Is Social Engineering? The Art of the Mental Heist
What is Social Engineering? The Art of the Mental Heist & How to Armor Your Mind Your phone buzzes. A text message from your bank. "Urgent alert: A suspicious login from an unrecognized device has been detected on your account. Please click here to secure your funds now." Your heart pounds. You've heard stories of this happening. In a panic, you tap the link, log in with your credentials, and change your password.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 20
Slowloris Cheatsheet: Guide to HTTP DoS Attack Tool
What is Slowloris? Slowloris is a classic denial-of-service (DoS) attack tool that targets web servers using partial HTTP requests. This cheatsheet provides a quick, practical overview of how to use Slowloris, understand its impact, and protect against it in your ethical hacking and cybersecurity research. Slowloris Cheatsheet The Low Bandwidth DoS Tool Reference Guide 🔍 Basic Usage Connection Options Timing Options…
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 20
Nepal’s Digital Crisis: Cyberattacks Crippling Government & Educational Websites
Nepal’s Digital Crisis: How Cyberattacks Are Crippling Government and Educational Websites Nepal's journey into the digital age has been a double-edged sword. While e-governance and digital services promise a more efficient future, a wave of cyberattacks has exposed the country’s profound cybersecurity vulnerabilities. In recent years, and particularly throughout 2024 and 2025, government and educational websites have become prime targets, leading to a digital crisis that threatens national security, public trust, and vital services.
cybersamir.com
Cyber Samir
@cybersamir.bsky.social
· Sep 16
What Is a RAT? Complete Overview
What is a RAT? A Complete Overview of Remote Access Trojans In the complex world of cybersecurity, a new vocabulary is constantly emerging. While terms like "virus" and "phishing" are widely known, a more insidious threat lurks in the digital shadows: the Remote Access Trojan, or RAT. These sophisticated pieces of malware are a favorite tool for hackers and cybercriminals because they provide the ultimate prize: complete, undetected control over a victim's device.
cybersamir.com