Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Metasploit from Scratch

Introduction Metasploit Framework is a penetration testing technology that has new and enhanced capabilities, including automation APIs, evasion modules, and usability enhancements, and provides...

View Article


Interview with Jason Ross

about Machine Learning, Deep Learning, AI, and more... To spice things up, the author gave us 2 sets of answers: one delivered by him, and one by ChatGPT! It is your job to guess which ones are his...

View Article


Image may be NSFW.
Clik here to view.

Writing A Simple Ransomware Using Python

Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts the files and demands a ransom for the decryption key; this places...

View Article

Interview with Jason Ross

about Machine Learning, Deep Learning, AI, and more. To spice things up, the author gave us 2 sets of answers: one delivered by him, and one by ChatGPT... It is your job to guess which ones are his...

View Article

Image may be NSFW.
Clik here to view.

Getting Offensive with Go

Introduction Creating Reverse Shells and bypassing Anti-Virus (AV) with Golang. Using Golang in security has become very popular over the last few years. In this article, I want to cover several...

View Article


Image may be NSFW.
Clik here to view.

Why Using Open Source Resources in App Development is Essential

App development can be a logistical nightmare if you do not know what you are doing, and if you don’t happen to have open source inventory management by your side when embarking on this venture, it’s...

View Article

Image may be NSFW.
Clik here to view.

Writing A Simple Ransomware Using Python

Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts the files and demands a ransom for the decryption key; this places...

View Article

Image may be NSFW.
Clik here to view.

Dynamic SQLIA Detection with PHP

Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern matching algorithm. As we know, SQL injection attacks are malicious...

View Article


The process of developing tactics with the purpose of preparing for a cyberwar

Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in the world. However, for a country to be a military power, they must develop...

View Article


Image may be NSFW.
Clik here to view.

New frontiers, new worlds, new threats 

Where are you going?There.What time will you be back?I will be back soon.  Mr.Cardoso Image created in midjourney  Introduction Since the beginning of human history, the world has been marked by...

View Article

Image may be NSFW.
Clik here to view.

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as the most effective current tool in the fight against terrorism...

View Article

Image may be NSFW.
Clik here to view.

Bitcoin Account Hijacking Using OSINT Techniques

Researchers at Kudelski Security have managed to break Bitcoin and Ethereum wallets using a novel attack against one of the most popular asymmetric key algorithms of modern cryptography. Although...

View Article

Image may be NSFW.
Clik here to view.

Email Delivery: How to Break All the Rules of Zero Trust

92% of malware spread through the email system. This is not a surprise if we consider that the email delivery system breaks almost all the rules defined in Zero Trust. Even though there are several...

View Article


Image may be NSFW.
Clik here to view.

A.I.-driven shields design for cyber warriors.

Since more private data is stored and transmitted digitally, cybersecurity has emerged as a pressing concern in the Internet Age.  Network intrusions can cause devastating financial losses, damage to...

View Article

Image may be NSFW.
Clik here to view.

Modern Special Forces Of The Future (Air, Land, Sea, Cyber)

The world is becoming more complicated and unpredictable, which means that the world's armed forces need to evolve in order to address the new challenges and threats they face. The development of...

View Article


Image may be NSFW.
Clik here to view.

Security of Privileged Access

Introduction Privileged access refers to the administrative access that allows an individual to access and control sensitive data, systems, and networks. This elevated access can be granted to...

View Article

Image may be NSFW.
Clik here to view.

Insider Threats: The Hidden Danger Within Your Organization and How to...

In today's digital age, information is power. With the increasing use of technology and the internet in the workplace, organizations are at a greater risk of insider threats than ever before. Insider...

View Article


Image may be NSFW.
Clik here to view.

Impact of Artificial Intelligence on Cybersecurity

Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are increasing budgets for cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

Hashcat: A Beginner's Guide

Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods on a live machine without any authorization. At the very end of this...

View Article

Image may be NSFW.
Clik here to view.

When PT in ChatGPT refers to Penetration Testing

Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If you haven’t previously been exposed to these topics, please search them on...

View Article
Browsing all 612 articles
Browse latest View live