WEBINAR: AWS Security Essentials with Afshan Naqvi
Bartek: Hello everyone, and welcome to the live webinar of Hakin9 Magazine. My name is Bartek Adach and I have …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
Slicing the Onion: An introduction to the Onion Routing
When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up …
Authenticity Verification of Findings in OSINT: Tools to Ensure Data Credibility
This is a continuation of the article: OSINT: A THOUGHTFULNESS ABOUT THE ADVANTAGES AND DISADVANTAGES OF THIS TECHNIQUE INTRODUCTION: As …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
Introduction to Defensive and Offensive AI in Cybersecurity
In the ever-changing landscape of cybersecurity, the conflict between criminal actors seeking to exploit vulnerabilities and defenders working on protecting …
The Bring Your Own Device (BYOD) Dilemma
The use of personal mobile devices like smartphones and tablets in the workplace, known as “bring your own device” (BYOD), …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …
Exploring the Dark Web: Unveiling its Dual Nature of Good and Evil
Freedom of speech is one of the fundamental human rights. It took a long time in human history to be …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
AI and the War on Trust
The AI Revolution A revolution of Artificial Intelligence has occurred in the past few years, leapfrogging previous machine learning systems, …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
WEBINAR: AWS Security Essentials with Afshan Naqvi
Bartek: Hello everyone, and welcome to the live webinar of Hakin9 Magazine. My name is Bartek Adach and I have …
Cyberattacks with the use of AI
Overview Artificial intelligence (AI)-based technologies are actively used for cyber defense purposes. With the continuous development and decreasing complexity in …
Multi-Factor Identification and AI Tools
Introduction In the modern world of computers and the internet, where vital information can be shared with a single click, …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations
The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …
Space Cybersecurity: a Strategic Issue in the Current Geopolitical Context
by Anaïs Shay-Lynn Vydelingum The security of space infrastructures is a geopolitical issue, as space-based resources are increasingly used by …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.