Jeff Minakata OfficialNew Edition

Phishing Breakdown

As the title implies, I will be breaking down a real-life phishing campaign that I have seen used a number …

Jul 22,2024

6 min read

Achoughi Tarik

WhatsApp Scam Attack Anatomie

In recent years, the rise of digital communication platforms has provided both opportunities and challenges in the realm of cybersecurity. …

Jul 22,2024

6 min read

Muhammed Mobin

The State of AI in Cybersecurity: Navigating the Evolving Threat Landscape in 2024 (Part 2)

Continuing our exploration from the previous blog, “The State of AI in Cybersecurity: Unveiling Global Insights from 1,800 Security Practitioners,” …

Jul 22,2024

6 min read

Muhammed Mobin

The State of AI in Cybersecurity: Understanding the Impact (Part 1) 

In an increasingly digitized world, where cyber threats loom large, the integration of Artificial Intelligence (AI) into cybersecurity strategies has …

Jul 22,2024

6 min read

Lochana Koralage Official

A.I.-driven shields design for cyber warriors.

Since more private data is stored and transmitted digitally, cybersecurity has emerged as a pressing concern in the Internet Age. …

Jul 22,2024

6 min read

Lucas Maclaud Official

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …

Jul 22,2024

6 min read

Wilson Mendes Official

New frontiers, new worlds, new threats

Where are you going?There.What time will you be back?I will be back soon.  Mr.Cardoso Image created in midjourney  Introduction Since …

Jul 22,2024

6 min read

Lochana Koralage Official

The process of developing tactics with the purpose of preparing for a cyberwar

Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …

Jul 22,2024

6 min read

Bartek Adach Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31,2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25,2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.