Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]
Hakin9
by Agata Staszelis [STAFF]
4d ago
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Authentication Flood' by Saeed Dehqan. Dive in ..read more
Visit website
Main Tips for Students to Protect Data Privacy
Hakin9
by Bartek Adach
3w ago
Main Tips for Students to Protect Data Privacy As technology becomes increasingly prevalent in our daily lives, it is more important than ever for students to be aware of and protect their data privacy. With the amount of personal information that is shared online, it is easy for sensitive information to fall into the wrong hands. From social media accounts to online class assignments, there are many ways that students can unknowingly compromise their data privacy. That is why students need to be proactive in protecting their information. In this article, we will discuss tips for students to p ..read more
Visit website
E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]
Hakin9
by Agata Staszelis [STAFF]
1M ago
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Client-Side Exploitation' by Krenar Kepuska. Dive in ..read more
Visit website
What are the Common Security Weaknesses of Cloud Based Networks?
Hakin9
by Agata Staszelis [STAFF]
1M ago
META: We’re breaking down what the most common security weaknesses are of the cloud and how to avoid these weaknesses. The cloud has been hugely impactful on the everyday running of many businesses. Basic operations and data are now stored in the cloud, making for a more organized and more secure data storage option than past examples of physical documents or even data stored in hard drives. However, the cloud isn’t faultless.  The importance of cloud based network monitoring, especially in the case of cloud-based networks, cannot be overstated, but it is just one element of the overall w ..read more
Visit website
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]
Hakin9
by Agata Staszelis [STAFF]
1M ago
This video tutorial presents how to deal with improper error handling. It is a part of our online course 'Penetration testing OWASP Top 10 Vulnerabilities' by Atul Tiwari. Dive in!   ..read more
Visit website
Introduction to Open-Source Intelligence | OSINT Fundamentals [FREE COURSE CONTENT]
Hakin9
by Agata Staszelis [STAFF]
1M ago
This video tutorial presents the introduction to Open-Source Intelligence (OSINT). It is a part of our online course 'OSINT Fundamentals' by Lakshit Verma. Dive in! JOIN THE FULL COURSE!   ..read more
Visit website
Monitoring Docker container metrics and events
Hakin9
by Agata Staszelis [STAFF]
3M ago
In the last few years, container utilization to build, share, and run applications has grown significantly. This growth comes from the fact that containers give developers the ability to package application code and all its dependencies. Also, with containers, users can gain an extra layer of security thanks to the isolation capabilities it provides. The introduction of Docker containers has paved the way for many organizations to easily host applications within containers. Docker containers are standardized, lightweight, and secure runtime instances of a Docker image. Containers out-of-the-bo ..read more
Visit website
Vulnerability management with Wazuh open source XDR
Hakin9
by Agata Staszelis [STAFF]
3M ago
Organizations have a hard time keeping track of vulnerabilities due to the large number of these that are discovered daily. From January to October 2022, over 19,000 vulnerabilities have been discovered, according to CVE Details. These vulnerabilities are disclosed in a publicly known list called the Common Vulnerabilities and Exposures (CVE).    A vulnerability is a weakness, bug, or flaw in a system that makes it open to exploitation by threat actors. Some notable vulnerabilities include Log4Shell, Follina, and Spring4Shell. Threat actors make use of exploits to compromise vul ..read more
Visit website
7 Tips to Build A Banking Application That Will Be User-Friendly
Hakin9
by Bartek Adach
4M ago
7 Tips to Build A Banking Application That Will Be User-Friendly According to Statista, 1.9 billion people globally use online banking services; the number is projected to reach 2.5 billion by 2024. Hence, it is crucial for every bank that wants to succeed and compete in the 21st century to have a user-friendly mobile banking application. According to EPAM Anywhere Business mobile banking app development is similar to other applications. The only significant difference is the extra focus directed at the security stage. So, while security is a huge focus, the same intensity must also be require ..read more
Visit website
Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Hakin9
by Marta Sienicka
5M ago
According to the M-Trends 2021 report by FireEye, the median time for an attacker to remain unnoticed in an enterprise's infrastructure is 24 days. This is enough to identify the weakest points in the infrastructure, gain access, and escalate the attack. It would be a mistake to say that the business owners are not taking steps to protect their assets and data. As per the Ponemon Institute, on average, companies use 47 different cybersecurity solutions and technologies. How effective are these security solutions in times of digital transformation? Advanced firewalls are becoming vulnerable as ..read more
Visit website

Follow Hakin9 on Feedspot

Continue with Google
OR