Security

APPLICATION SECURITY TESTING

Introduction The digital era has made the world seem compact. Things that used to take an entire day are now …

Mar 07,2023

10 min read

Interview with Karan Dwivedi - For Hakin9 Magazine

Hakin9 Magazine: Hello, Karan! It means a lot to us that you agreed to the interview! It would mean a …

Feb 26,2023

7 min read

Is Your Home Safe From Hackers? |Infographic by Who is Hosting This?

Hackers were never so powerful as they were in the 1990s movies. By furiously typing on their keyboards, they could …

Jun 14,2016

3 min read

Changing Passwords Regularly is Doing More Harm Than Good

Changing Passwords Regularly is Doing More Harm Than Good How often do you change your passwords? Every month? Every year? …

Jun 09,2016

4 min read

Lucas Maclaud OfficialNew Edition

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …

Mar 08,2023

12 min read

Wilson Mendes OfficialNew Edition

New frontiers, new worlds, new threats 

Where are you going?There.What time will you be back?I will be back soon.  Mr.Cardoso Image created in midjourney  Introduction Since …

Mar 08,2023

14 min read

Lochana Koralage OfficialNew Edition

The process of developing tactics with the purpose of preparing for a cyberwar

Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …

Mar 08,2023

11 min read

Taqie Taqiezadeh OfficialNew Edition

Dynamic SQLIA Detection with PHP

Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern …

Mar 08,2023

17 min read

Hacking Blockchain based APIs (W69)

Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.

Mar 11,2023

9 min read

Penetration testing OWASP Top 10 Vulnerabilities (W68)

OWASP Top 10 is the standard awareness for web application security and developers; it covers a broad area of most critical security risks to web application security. Almost every company adopts OWASP Top 10 approach to secure web applications and minimize the risks. Any penetration testers going to work within an organization need to follow the Top 10 to ensure application security and minimize the risks to the organization. This course is going to do the same in the practical scenario of how you can test for OWASP Top 10 vulnerabilities in more effective ways.

Mar 08,2023

15 min read

IoT Security - the DVID Challenge - NEW EDITION (W67)

IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to steward the development process but many protocols and custom solutions to connect hardware to a cloud. Sometimes, a middleware (like smartphone application) could be encountered between hardware and cloud.

Mar 07,2023

27 min read

OSINT Fundamentals (W66)

This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in: *Gaining a better understanding of OSINT techniques *Improving investigative skill set *Improving overall research methodology *Improving personal OPSEC OSINT is one of the key skills required for both Red and Blue Team jobs - if you want to put these skills in your resume with confidence, this course will help!

Aug 23,2022

11 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023