Blog

Latest news around the world

21

Jul'21

Automation of the reconnaissance phase during Web Application Penetration Testing III | by Karol Mazurek

Automation of the reconnaissance phase during Web Application Penetration Testing III by Karol Mazurek This article is a continuation of …

Read More

12

Jul'21

Coop supermarket closes hundreds of stores after Kaseya supply chain ransomware attack | by Pierluigi Paganini

Coop supermarket closes hundreds of stores after Kaseya supply chain ransomware attack  by Pierluigi Paganini  Swedish supermarket chain Coop is …

Read More

05

Jul'21

Osintgram | by Giuseppe Criscione

Osintgram by Giuseppe Criscione Osintgram is a OSINT tool on Instagram to collect, analyze, and run reconnaissance. Disclaimer: FOR EDUCATIONAL PURPOSE ONLY! The …

Read More

28

Jun'21

List of darknet markets & vendor shops for investigators #3 | By Maciej Makowski

List of darknet markets & vendor shops for investigators #3 by Maciej Makowski This is a long overdue continuation of …

Read More

21

Jun'21

Practical ransomware protection tips | by Maciej Makowski

Practical ransomware protection tips by Maciej Makowski Last week brought a global spike in ransomware attacks – with the most …

Read More

16

Jun'21

Caronte - A Tool To Analyze The Network Flow During Attack/Defence Capture The Flag Competitions | by Zion3R

Caronte - A Tool To Analyze The Network Flow During Attack/Defence Capture The Flag Competitions by Zion3R Caronte is a …

Read More

01

Jun'21

Newspaper3k: Article scraping & curation | by Lucas Ou-Yang

Newspaper3k: Article scraping & curation by Lucas Ou-Yang Inspired by requests for its simplicity and powered by lxml for its speed: “Newspaper is an …

Read More

25

May'21

Improving Java’s Visibility Modifiers with ArchUnit | by Grzegorz Piwowarek

Improving Java’s Visibility Modifiers with ArchUnit by Grzegorz Piwowarek Encapsulation and separation of internal components from public ones is probably …

Read More

20

May'21

Photographic Evidence and Photographic Evidence Tampering

The following is just an introduction to an advanced forensics course focusing on photographic evidence. If you want to learn …

Read More

17

May'21

Detecting Ransomware Precursors | by Andrew Skatoff

Detecting Ransomware Precursors by Andrew Skatoff The business model for Ransomware has evolved to include multi-level and multi-stage services and …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013