Easy Solutions’ New Version of Its Proprietary DMS Cyberfraud Protection System
Easy Solutions’ New Version of Its Proprietary DMS Cyberfraud Protection System Makes Proactive Online Monitoring Faster and More Accurate Updated …
ZeroNights hacking conference featured a guide to hijacking a plane, a car, or kidnapping a child
On November 19 and 20, the international ZeroNights conference, organized by ERPScan, was held in Moscow, where security researchers shared …
Open Letter to Our Readers!
Hakin9 in 2012. Accomplishments and statistics. Dear Hakin9 Readers, Â 2012 is nearly over. As usual, we have prepared something extraordinary …
MACCONEXT LAUNCH AFRICAN HARD COPY EDITION OF HAKIN9
MACCONEXT INFORMATION SECURITY LIMITED FORGES STRATEGIC ALLIANCE WITH HAKIN9 MEDIA SP.Z.O.O TO LAUNCH THE AFRICAN EDITION OF HAKIN9 MAGAZINE Macconext …
IDENTIFYING ATTACKERS IN THE EARLY PHASE OF THE CYBER KILL CHAIN
Modern cyberwarfare requires a deep understanding of attacker tactics and an agile response to protect organizations against evolving threats. In …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations
The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.