Hakin9 TEAM

How to Spy on Android Phones – A Quick Hack

Sometimes, it can become necessary to spy on employees because of security concerns from an employer’s perspective to maintain productivity …

Oct 31,2016

7 min read

Hiep Nguyen

Overview of mobile platforms (March 2013)

This article describes hardware and software division on the mobile platform market. “Mobile platform” means mass handheld devices with an autonomous power source designated for solving a large variety of general tasks: entertainment, communications and business. This article does not examine personal desktop computers and their portable versions (notebooks/netbooks/etc.)

Apr 05,2013

4 min read

Hiep Nguyen

Free mobile apps collecting your device data

I've (Julian Evans blog) just completed some research of some free mobile apps across BlackBerry, iOS and Android. What I …

Oct 31,2016

7 min read

Hiep Nguyen

Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 …

Oct 31,2016

7 min read

Jeff Minakata OfficialNew Edition

Phishing Breakdown

As the title implies, I will be breaking down a real-life phishing campaign that I have seen used a number …

Oct 31,2016

7 min read

Ivan Suarez OfficialNew Edition

Revolutionizing Workflow and Efficiency with Large Language Models (LLMs)

In the rapidly evolving landscape of artificial intelligence, large language models (LLMs) have emerged as powerful tools driving significant advancements …

Oct 31,2016

7 min read

Filipi Pires OfficialNew Edition

CVE-2024-6387 Vulnerability Checker

Overview This Python script is designed to check SSH servers for the CVE-2024-6387 vulnerability, specifically targeting the recently discovered regreSSHion, which …

Oct 31,2016

7 min read

Kai Aizen OfficialNew Edition

Weaponization in the Cloud: Unmasking the Threats and Tools

Unveiling the Cloud’s Hidden Dangers In the fast-paced world of cybersecurity, mastering the details of the cyber kill chain is …

Oct 31,2016

7 min read

Bartek Adach Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31,2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25,2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.