Lucas Maclaud Official

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …

Mar 08,2023

12 min read

Hakin9 TEAM

Changing Passwords Regularly is Doing More Harm Than Good

Changing Passwords Regularly is Doing More Harm Than Good How often do you change your passwords? Every month? Every year? …

Jun 09,2016

4 min read


Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf

In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

Aug 11,2015

1 min read

Gilbert Oviedo OfficialNew Edition

Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques

In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …

Apr 04,2024

14 min read

Mariana do Carmo Gouveia OfficialNew Edition


Modern cyberwarfare requires a deep understanding of attacker tactics and an agile response to protect organizations against evolving threats. In …

Mar 28,2024

8 min read

Matthew Maynard OfficialNew Edition

Revealing Killnet: The Power of Reconnaissance with DNSdumpster

In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …

Mar 18,2024

9 min read

Angelina Tsuboi OfficialNew Edition

The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?

About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …

Feb 23,2024

15 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …

Sep 14,2023

9 min read

Youssef Khaoulaj Course

Web Application Penetration Testing (W71)

Enter a short description of the course.

Aug 30,2023

8 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.