Hiep Nguyen

Easy Solutions’ New Version of Its Proprietary DMS Cyberfraud Protection System

Easy Solutions’ New Version of Its Proprietary DMS Cyberfraud Protection System Makes Proactive Online Monitoring Faster and More Accurate Updated …

Dec 12,2012

3 min read

Hiep Nguyen

ZeroNights hacking conference featured a guide to hijacking a plane, a car, or kidnapping a child

On November 19 and 20, the international ZeroNights conference, organized by ERPScan, was held in Moscow, where security researchers shared …

Dec 10,2012

2 min read

Hiep Nguyen

Open Letter to Our Readers!

Hakin9 in 2012. Accomplishments and statistics. Dear Hakin9 Readers,  2012 is nearly over. As usual, we have prepared something extraordinary …

Dec 06,2012

4 min read

Hiep Nguyen

MACCONEXT LAUNCH AFRICAN HARD COPY EDITION OF HAKIN9

MACCONEXT INFORMATION SECURITY LIMITED FORGES STRATEGIC ALLIANCE WITH HAKIN9 MEDIA SP.Z.O.O TO LAUNCH THE AFRICAN EDITION OF HAKIN9 MAGAZINE Macconext …

Dec 06,2012

1 min read

Giannis Kostakis - CEO, Jonida Mema - Security Analyst OfficialNew Edition

Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence

Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …

Apr 25,2024

14 min read

Gilbert Oviedo OfficialNew Edition

Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage

Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …

Apr 25,2024

9 min read

Gilbert Oviedo OfficialNew Edition

Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques

In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …

Apr 04,2024

14 min read

Mariana do Carmo Gouveia OfficialNew Edition

IDENTIFYING ATTACKERS IN THE EARLY PHASE OF THE CYBER KILL CHAIN

Modern cyberwarfare requires a deep understanding of attacker tactics and an agile response to protect organizations against evolving threats. In …

Mar 28,2024

8 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

Enter a short description of the course.

Apr 25,2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …

Sep 14,2023

9 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.