Blog

Latest news around the world

15

Feb'19

A Brief Introduction to PySpark by Ben Weber

PySpark is a great language for performing exploratory data analysis at scale, building machine learning pipelines, and creating ETLs for …

Read More

13

Feb'19

The Internet of Things Security Institute (IoTSI) releases IoT Security Framework for Smart Cities and Critical Infrastructure.

The Internet of Things Security Institute (IoTSI) announced today that it has released an IoT Security Framework for Smart Cities …

Read More

13

Feb'19

How to Dockerize your End-to-End acceptance tests by Dominic Fraser

This article serves as a “how-to” guide for using Selenium Docker images alongside CodeceptJS and an Express server. In it, …

Read More

13

Feb'19

Open sourcing Terratest: a swiss army knife for testing infrastructure code by Yevgeniy Brikman

Infrastructure as code (IaC) tools such as Terraform, Packer, and Docker offer a number of advantages: you can automate your …

Read More

12

Feb'19

Email Impersonation Scams by Gabor Szathmari

What You or Your IT Staff Can Do to Protect Your Business A major cyber threat to Australian businesses is email-based …

Read More

12

Feb'19

BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts) by Daniel A. Bloom

Throughout the reverse engineering learning process I have found myself wanting a straightforward guide for what to look for when …

Read More

11

Feb'19

Hacker Motives: Trends and Prevention Tips by Varonis

The evolution of technology always creates positive and negative possibilities in our everyday lives. For example, home assistants help busy …

Read More

11

Feb'19

Analysis of a Kubernetes hack — Backdooring through kubelet by Alexander Urcioli

Unless you’ve been living under a rock for the past three years, you’ve probably heard about Kubernetes. At Handy, our …

Read More

11

Feb'19

Picking the low hanging passwords by David Gilbertson

According to a not-at-all recent report by Keeper, there’s a 50/50 chance that any user account can be accessed with …

Read More

11

Feb'19

Bypassing Google’s authentication to access their Internal Admin panels  by  Vishnu Prasad P G

Hi all, I’m Vishnu prasad , a third year engineering student, a passionate developer and a noob in bug hunting ( …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013