
Hakin9
1000 FOLLOWERS
The monthly magazine and online training provider dedicated to hacking and cybersecurity. Our tutorials, case studies, and online courses will prepare you for the upcoming, potential threats in the cybersecurity world.
Hakin9
4d ago
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Authentication Flood' by Saeed Dehqan. Dive in ..read more
Hakin9
3w ago
Main Tips for Students to Protect Data Privacy
As technology becomes increasingly prevalent in our daily lives, it is more important than ever for students to be aware of and protect their data privacy. With the amount of personal information that is shared online, it is easy for sensitive information to fall into the wrong hands. From social media accounts to online class assignments, there are many ways that students can unknowingly compromise their data privacy. That is why students need to be proactive in protecting their information. In this article, we will discuss tips for students to p ..read more
Hakin9
1M ago
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Client-Side Exploitation' by Krenar Kepuska. Dive in ..read more
Hakin9
1M ago
META: We’re breaking down what the most common security weaknesses are of the cloud and how to avoid these weaknesses.
The cloud has been hugely impactful on the everyday running of many businesses. Basic operations and data are now stored in the cloud, making for a more organized and more secure data storage option than past examples of physical documents or even data stored in hard drives. However, the cloud isn’t faultless.
The importance of cloud based network monitoring, especially in the case of cloud-based networks, cannot be overstated, but it is just one element of the overall w ..read more
Hakin9
1M ago
This video tutorial presents how to deal with improper error handling. It is a part of our online course 'Penetration testing OWASP Top 10 Vulnerabilities' by Atul Tiwari. Dive in!
  ..read more
Hakin9
1M ago
This video tutorial presents the introduction to Open-Source Intelligence (OSINT). It is a part of our online course 'OSINT Fundamentals' by Lakshit Verma. Dive in! JOIN THE FULL COURSE!
  ..read more
Hakin9
3M ago
In the last few years, container utilization to build, share, and run applications has grown significantly. This growth comes from the fact that containers give developers the ability to package application code and all its dependencies. Also, with containers, users can gain an extra layer of security thanks to the isolation capabilities it provides. The introduction of Docker containers has paved the way for many organizations to easily host applications within containers. Docker containers are standardized, lightweight, and secure runtime instances of a Docker image.
Containers out-of-the-bo ..read more
Hakin9
3M ago
Organizations have a hard time keeping track of vulnerabilities due to the large number of these that are discovered daily. From January to October 2022, over 19,000 vulnerabilities have been discovered, according to CVE Details. These vulnerabilities are disclosed in a publicly known list called the Common Vulnerabilities and Exposures (CVE).
A vulnerability is a weakness, bug, or flaw in a system that makes it open to exploitation by threat actors. Some notable vulnerabilities include Log4Shell, Follina, and Spring4Shell.
Threat actors make use of exploits to compromise vul ..read more
Hakin9
4M ago
7 Tips to Build A Banking Application That Will Be User-Friendly
According to Statista, 1.9 billion people globally use online banking services; the number is projected to reach 2.5 billion by 2024. Hence, it is crucial for every bank that wants to succeed and compete in the 21st century to have a user-friendly mobile banking application. According to EPAM Anywhere Business mobile banking app development is similar to other applications. The only significant difference is the extra focus directed at the security stage. So, while security is a huge focus, the same intensity must also be require ..read more
Hakin9
5M ago
According to the M-Trends 2021 report by FireEye, the median time for an attacker to remain unnoticed in an enterprise's infrastructure is 24 days. This is enough to identify the weakest points in the infrastructure, gain access, and escalate the attack. It would be a mistake to say that the business owners are not taking steps to protect their assets and data. As per the Ponemon Institute, on average, companies use 47 different cybersecurity solutions and technologies. How effective are these security solutions in times of digital transformation?
Advanced firewalls are becoming vulnerable as ..read more