Security in the Age of AI

(1 customer review)


23 items sold

Get the access to all our courses via Subscription


Categories: ,


Dear Readers,

(honoring the theme of this issue we collaborated with ChatGPT on this first paragraph)

"In today's world, AI has become an omnipresent force. From virtual assistants to personalized healthcare solutions and autonomous vehicles, its integration is all-encompassing. In this issue, we explore the implications of Artificial Intelligence pervasiveness and the security challenges it brings. Join us as we navigate the ever-evolving landscape of 'Security in the Age of AI.' "

The future is truly bright and it's coming upon us faster than we could imagine. Protecting oneself is a human right, and we're very passionate about this and honored that we can collaborate with such informed experts.

In this issue, we're approaching security from different perspectives. You will find articles on insider threats as well as protecting your privacy online. D4RKR4BB1T, the author of our Hakin9 Crime Corner, agreed to give us an exclusive and uncensored (despite the risks!) interview about his work in the cyber investigation industry. We're also excited to publish a three-text compendium about zero trust security's history, architecture, and development. André Ricardo, a cybersecurity specialist from VIVO composed his list of essential tips on getting into the offensive security industry. After that, you can delve into the fascinating topic of how artificial intelligence tools affect modern marketing, by content marketing consultant Kuba Czubajewski.

We're very proud of this issue and hope it will be the start of important conversations and ideas. Delve in!
Wiktoria Bukowska and the Hakin9 Editorial Team


How the Human Factor Plays a Role in Android Security

Mohammad Hossein Heydarchi

The first article in this issue is covering the topic of common malware risks in Android security. Learn how to protect your data from malware threats and get insights into specific instances of Android malware in 2023. Stay safe and informed in the digital world!

Keys to Mitigating Insider Threats

Josh Breaker-Rolfe

Insider threats are a rising challenge in the world of cybersecurity. Learn how organizations can effectively mitigate these risks. From identifying warning signs to implementing AI-powered tools, this article outlines practical strategies to safeguard against intentional and unintentional insider threats

Exclusive Interview with D4RKR4BB1T47

In this intriguing interview, D4RK R4BB1T discusses his background, alias, and experience in investigating and mitigating insider threats. He reveals valuable insights into his investigative methods, and how he protects himself in the world of cybersecurity and dark web marketplaces. 

"7 Essential Tips that Helped Me to Get into Offensive Security"

André Ricardo

André Ricardo, a Senior CyberSecurity Analyst at Vivo, shares crucial tips and insights for those venturing into hacking. Discover the importance of ethics, teamwork, and perseverance as you embark on an exhilarating journey filled with challenges and rewards.

Post-AI Marketing - More Human than Ever

Kuba Czubajewski

This riveting article takes readers through the author's experience with AI-generated content and its effects on the content marketing landscape. While AI has streamlined some tasks, the article emphasizes the value of human expertise in crafting in-depth, meaningful content that resonates with customers and fosters authentic relationships.

Privacy: Protecting Your Personal Information Online

Manish Mradul

The author explores the shift in marketing methods due to the growth of technology and the use of Big Data systems. While these systems offer advantages for decision-making, the need to protect personal data isn't any less important. This article provides practical steps to ensure online privacy and safe internet usage.

What is Zero Trust Network Architecture (ZTNA)?

Chirath De Alwis, Umeshika De Seram, Jethendri Wathsala Perera, H.M.H Sanjeewa, Vidusha Shalani

The first part of the "Zero Security Compendium" introduces the Zero Trust Network Architecture (ZTNA), a response to evolving cyber threats. It explains the core principles, advantages, and potential challenges, along with mitigation strategies for organizations seeking to adopt this paradigm shift in cybersecurity.

Security of Zero Trust

Chirath De Alwis, Nipuna Manujaya, Mohamed Sinan, Singha Dulain

The second part focuses solely on the topic of Zero Trust system security. This article explores the basics of Zero Trust, its security controls, and its importance in the evolving cybersecurity landscape.

The Development of Zero Trust Security

Chirath De Alwis, Sulaksha Punsara Jayawikrama, H.A.Neelaka Nilakshana, Chamith Sandaru Bandara, Sheruni Pilapitiya, Rusiru Kashmeera

Compendiums' third part proves that Zero Trust Security is truly a modern approach to cybersecurity. Challenging the idea of blindly trusting users and devices inside a network. Instead, it focuses on continuous verification and strict access controls to protect digital assets effectively.

From SEH Overwrite with Egg Hunter to Get a Shell

Rodolpho Concurde (ROd0X)

In the final article of this issue, Rodolpho Concurde explores the SEH Overwrite technique along with the Egg Hunter technique to achieve a more stable exploit for gaining a shell.

1 review for Security in the Age of AI

  1. Alameen Karim Merali

    Contains a great amount of information about cyber-security and artificial intelligence. Highly recommended to purchase and read.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.