
Ran Isenberg
Feb 107 min read
5 Serverless Architecture Patterns You Should Stop Using (And What to Do Instead)
Avoid common AWS Serverless architecture pitfalls! Learn 5 outdated patterns & the best practices to replace them for better services

Ran Isenberg
Jan 276 min read
How Social Engineering Phishing Works: My Real-Life Encounter
Fell for a phishing attack using social engineering? I did—almost. Here’s how it worked, the tech behind it, and tips to stay safe.