Blog

Latest news around the world

09

Jul'20

AirDrop Forensics | by Kinga Kięczkowska

AirDrop Forensics ✨ Welcome to AirDrop forensics! ✨ Let’s start with the basics: what is AirDrop? It’s a file-sharing service …

Read More

08

Jul'20

Android Forensics Challenge [FREE COURSE CONTENT]

In this course content blog we want to share an Android Forensics challenge - we are publishing evidence files from …

Read More

07

Jul'20

Cybersecurity Career Guide: How to Land the Best Jobs | from University of Nevada

Cybersecurity Career Guide: How to Land the Best Jobs Cybercrime can’t simply hurt businesses. It can destroy them. After a …

Read More

26

Jun'20

New spam / phishing campaign on Whatsapp – investigating fake Dominos pizza websites | By Maciej Makowski

New spam / phishing campaign on Whatsapp – investigating fake Dominos pizza websites This week’s focus is an impromptu investigation …

Read More

26

Jun'20

AppInit DLL injection | By Siddharth Sharma

AppInit DLL injection Recently some earlier versions of Ramsay malware (malware capable of operating within air-gapped networks) used AppInit Dlls …

Read More

24

Jun'20

File System Tunneling [FREE COURSE CONTENT]

In this video from our NTFS Forensics course our instructor, Divya Lakshmanan, will explain what is file system tunneling. This concept is an …

Read More

22

Jun'20

How Businesses Can Avoid Internal Fraud | From modestmoney.com

| sponsored post | How Businesses Can Avoid Internal Fraud An employer never expects an employee he or she hires …

Read More

18

Jun'20

Analyze Binaries in Ghidra to Write Shell Payload in C for Windows Systems | By Dennis Chow

Analyze Binaries in Ghidra to Write Shell Payload in C for Windows Systems In this article, we’ll go over some example …

Read More

17

Jun'20

Insider Threat Detection with AI Using Tensorflow and RapidMiner Studio | By Dennis Chow

Insider Threat Detection with AI Using Tensorflow and RapidMiner Studio Summary This technical article will teach you how to pre-process …

Read More

15

Jun'20

ITSM Solutions Security Trends to Watch out for

| sponsored post | ITSM Solutions Security Trends to Watch out for How is ITSM going to change over the …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013