cd/layer8 logo

exploring the behavioral edges of digital threatspace. notes, ideas, and fieldwork from the cognitive perimeter.

phishlure
The Decoy Effect in Cyber Threats: A Psychological Analysis of APT Lure Design
how threat actors exploit curiosity, urgency, and authority in file naming
Article thumbnail
Coming Soon...
?