Hiep Nguyen

Apple release critical Mac OS X 10.6 and 10.7 updates

Apple has updated vulnerabilities in Java for Mac OS X 10.6 and 10.7 systems, some of which could allow an …

Nov 10, 2011

2 min read

Hiep Nguyen

Adobe release critical ShockWave security update

Critical vulnerabilities have been identified in Adobe Shockwave Player 11.6.1.629 and earlier versions on the Windows and Macintosh operating systems. …

Nov 10, 2011

2 min read

Hiep Nguyen

Apple fix 96 vulnerabilities in iOS 5 release

Apple has this week (12th October) released it's latest mobile operating system called iOS 5. The new iOS 5 patches …

Oct 14, 2011

2 min read

Hiep Nguyen

Microsoft fix 23 vulnerabilities for "Patch Tuesday"

Microsoft have released their "Patch Tuesday" update for October 11th which includes a critical flaw that could give attackers the …

Oct 6, 2011

2 min read

Joe Shenouda Official New Edition

AI-powered Incident Response

Let's dive into the world of AI-powered incident response in cybersecurity. I've always been fascinated by how AI can transform …

Sep 30, 2024

2 min read

Tarik Achoughi Official New Edition

AI in the Battle for Cybersecurity, Defender or Threat?

AI is changing the way we think about cybersecurity, but it also raises important questions about what happens when both …

Sep 30, 2024

2 min read

Dr. Charles Saroufim Official New Edition

Malware Analysis and Development in the age of AI

Artificial intelligence (AI) has revolutionized the way we think about efficiency, automation, and problem-solving in recent years, affecting sectors such …

Sep 27, 2024

2 min read

Gilbert Oviedo Official New Edition

AI's Limitations in Detecting Malicious Activity

AI excels at analyzing patterns, predicting outcomes, and identifying known anomalies with great speed and accuracy. However, it struggles to …

Sep 25, 2024

2 min read

Alexander Teggin Course

Personalized AI: How to Jailbreak, Train, and Customize your own AI Assistant (W78)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 27, 2024

10 min read

Hugo Le Belzic Course

Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)

This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.

Sep 19, 2024

6 min read

Robert Thomas Course

Build Ethical Hacking Arsenal with ChatGPT-4o (W76)

AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.

May 31, 2024

9 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.

Apr 25, 2024

10 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023