Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Bypassing and Securing Kubernetes Ingress Network Policies

AuthorsKavyashree Ramesh, Tousif Khazi, Tejas Jaiswal   About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability assessment & ethical hacking of web, mobile...

View Article


Image may be NSFW.
Clik here to view.

OSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique

OSINT, What is it? OSINT, acronym word from English Open Source Intelligence, refers to a set of techniques about collection of data of interest, raw at first sometimes, obtained through publicly...

View Article


Image may be NSFW.
Clik here to view.

Secure Coding Practices in Python: Best Practices for Avoiding Common...

Overview Creating a program is only one aspect of coding. Because stolen data is just as harmful as viruses, protecting sensitive data is just as crucial as creating the application of choice. Even...

View Article

Image may be NSFW.
Clik here to view.

Exclusive Interview with Alexandre Teyar - the creator of BurpGPT

Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is why we have decided to talk with the person who connected them both. The guest in this interview is...

View Article

Image may be NSFW.
Clik here to view.

Engaging Social Engineering: Extracting Information through Strategic...

Editorial note: We decided to remove any and all last names from the examples section as to not be drawn into any potential legal disputes. In the place of any last names, you will find “*****”...

View Article


Image may be NSFW.
Clik here to view.

External Understanding: Dissecting APIs inside of IoT devices (Part 1)

Introduction As the world of IoT evolves, so does the security within this realm, like most fields. One of the more popular brands for being quite hidden from the public is Apple. Despite Apple having...

View Article

Image may be NSFW.
Clik here to view.

External Understanding: Dissecting APIs inside of IoT devices (Part2)

Introduction If you have not read Part 1, it is highly suggested that you do so. This article is the second part and continuation of the article `External Understanding: Dissecting APIs inside of IoT...

View Article

Image may be NSFW.
Clik here to view.

Regular Expression Denial of Service

Service uptime and availability is a crucial factor that determines the success of online businesses. In a rapidly evolving world, it is important that transactions remain productive, and they help...

View Article


Image may be NSFW.
Clik here to view.

VPN vs. MPLS: Choosing the Right Solution for Your Business

The corporate world of today is all about connectivity. Having a dependable and secure network is essential to your business, whether you’re managing a small start-up or a huge international...

View Article


Image may be NSFW.
Clik here to view.

Risks and Opportunities: Exploring the Impact of Google's New TLDs

In its expansion of top-level domains (TLDs), Google Registry has introduced eight new domains, including .dad, .phd, .prof, .esq, .foo, .nexus, .zip, and .mov. These additions aim to cater to various...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing with Burp Suite: Enhancing Web Application Security

In today's interconnected world, web applications play a critical role in various aspects of our lives, ranging from online banking to e-commerce and social media. However, with the increasing...

View Article

Image may be NSFW.
Clik here to view.

The Issue of Overlooking Personal Network Security and Its Implications

Technology is an integrated part of society in nearly every aspect of life these days, and this leads to information processed and stored by technology being commonplace. This leads to the issue of how...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat with Chat GPT

Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex customer queries and lack of real-time customer engagement, are no more, thanks to AI chatbots that help...

View Article


Image may be NSFW.
Clik here to view.

Protecting Yourself From People Like Me

As a pentester, part of my job is running social engineering exercises. To be successful, I look for information I can use that will make my communication appear more authentic, and can be used to...

View Article

Image may be NSFW.
Clik here to view.

Authenticity Verification of Findings in OSINT: Tools to Ensure Data Credibility

This is a continuation of the article: OSINT: A THOUGHTFULNESS ABOUT THE ADVANTAGES AND DISADVANTAGES OF THIS TECHNIQUE   INTRODUCTION: As the world becomes increasingly interconnected, the amount of...

View Article


Interview with D4RKR4BB1T

Background: My name is Pavel M. Kravchenko. I was born 23-10-1996 in the US to a Russian mother, and a …

View Article

From SEH Overwrite with Egg Hunter to Get a Shell

Introduction The Windows operating system has a default "handler" that catches any exception that is not handled by the program. …

View Article


How the Human Factor Plays a Role in Android Security

When it comes to security, we should have a thorough understanding of how various components impact and interact with it. …

View Article

Keys to Mitigating Insider Threats

Cyber threats can come from anywhere. For organizations facing an onslaught of external attacks, it’s easy to forget that fact. …

View Article

Privacy: Protecting your personal information Online

With the growth of technology, the ways of marketing have observed a paradigm shift. In the past, the marketing agencies …

View Article
Browsing all 612 articles
Browse latest View live