All posts by admin

21

Feb'19

Using phishing tools against the phishers— and uncovering a massive Binance phishing campaign. – Harry Denley

Jeremiah O’Connor (security researcher at Cisco) forwarded me a domain that has been phishing for Binance logins — logins-binance.com12754825.ml. This domain has …

Read More

20

Feb'19

Attacking Private Networks from the Internet with DNS Rebinding by Brannon Dorsey

TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home …

Read More

18

Feb'19

How NOT to design RESTful APIs by Rob Konarskis

I was helping out a friend who needed to integrate housing availability from a property management system with his client’s …

Read More

18

Feb'19

Learning Go — from zero to hero by Milap Neupane

Let’s start with a small introduction to Go (or Golang). Go was designed by Google engineers Robert Griesemer, Rob Pike, …

Read More

18

Feb'19

A Complete Machine Learning Project Walk-Through in Python: Part One by Will Koehrsen

Reading through a data science book or taking a course, it can feel like you have the individual pieces, but …

Read More

11

Feb'19

Hacker Motives: Trends and Prevention Tips by Varonis

The evolution of technology always creates positive and negative possibilities in our everyday lives. For example, home assistants help busy …

Read More

06

Feb'19

Turning the frustration of a mobile game into a reverse engineering training by Guillaume Lesniak

I consider myself a grey hat. I’m far from being the best hacker or cracker in this world, and I …

Read More

06

Feb'19

Preventing Mimikatz Attacks by Panagiotis Gkatziroulis

Mimikatz is playing a vital role in every internal penetration test or red team engagement mainly for its capability to …

Read More

05

Feb'19

Lost in Translation: Speaking the Same Cybersecurity Language in Your Office by Pauline Farris

According to most of those “in the know,” the most common causes of data breaches are employee activity on company …

Read More

09

Jul'15

Deep Inside Malicious PDF

By YELIA MAMDOUH EL GHALY When we start to check the PDF files that exist in our PC or laptop, …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013