Blog

Latest news around the world

07

Dec'22

Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

This video tutorial presents how to deal with improper error handling. It is a part of our online course 'Penetration …

Read More

06

Dec'22

Introduction to Open-Source Intelligence | OSINT Fundamentals [FREE COURSE CONTENT]

This video tutorial presents the introduction to Open-Source Intelligence (OSINT). It is a part of our online course 'OSINT Fundamentals' …

Read More

02

Nov'22

Monitoring Docker container metrics and events

In the last few years, container utilization to build, share, and run applications has grown significantly. This growth comes from …

Read More

12

Oct'22

Vulnerability management with Wazuh open source XDR

Organizations have a hard time keeping track of vulnerabilities due to the large number of these that are discovered daily. …

Read More

26

Sep'22

7 Tips to Build A Banking Application That Will Be User-Friendly

7 Tips to Build A Banking Application That Will Be User-Friendly According to Statista, 1.9 billion people globally use online …

Read More

29

Aug'22

Deception Technologies: Improving Incident Detection and Response by Alex Vakulov

According to the M-Trends 2021 report by FireEye, the median time for an attacker to remain unnoticed in an enterprise's …

Read More

25

Aug'22

Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky

Mobile app development needs to focus on cybersecurity, just as much as it does on functionality and flexibility, if not …

Read More

23

Aug'22

API Key, a Key to Credential Leakage & Manipulation

Django, is a Python-based web framework that allows developers to easily create secure and maintainable websites. This free open source …

Read More

23

Aug'22

Rekono - Execute full pentesting processes combining multiple hacking tools automatically

Rekono combines other hacking tools and their results to execute complete pentesting processes against a target in an automated way. …

Read More

19

Aug'22

hoaxshell - An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic

Purpose hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013