Blog

Latest news around the world

13

May'20

How to Handle DevOps Failure? | By Rebecca James

| collaborative article | How to Handle DevOps Failure?  Ever since the concept of DevOps was first introduced in 2008, …

Read More

07

May'20

TrickBot Analysis and Forensics | By Siddharth Sharma

TrickBot Analysis and Forensics This blog is about the analysis of a recent trickbot variant uploaded on malware traffic. The sample …

Read More

06

May'20

Malwoverview 3.0.0 is available! | By Alexandre Borges

Malwoverview 3.0.0 is available! command examples available on GitHub Malwoverview is a first response tool to perform an initial and …

Read More

05

May'20

Close the Security Gaps of a Remote Workforce | From itopia.com

 Close the Security Gaps of a Remote Workforce : The steps companies should take to ensure secure access when enabling …

Read More

29

Apr'20

Pattern Noise Based Source Camera Identification [FREE COURSE CONTENT]

In this excerpt from our Digital Video Forensics online course by Dr Raahat Singh we will deal with the complex …

Read More

25

Apr'20

Capitalizing on Coronavirus: How Hackers Are Using Fear to Prey on the Public | By Luke Smith

Capitalizing on Coronavirus: How Hackers Are Using Fear to Prey on the Public As the coronavirus blazed its way across …

Read More

24

Apr'20

Anatomy of Automated Account Takeovers | By Tal Eliyahu & Begum Calguner

Anatomy of Automated Account Takeovers Overview of Climate Fostering ATOs Living in an era of data privacy dystopia, having an …

Read More

23

Apr'20

Tips to write an effective Forensic Expert Witness Report - Part 1 | By Dr Malvika Mehta (ACSFS) (MSc) (BAMS)

Tips to write an effective Forensic Expert Witness Report - Part 1 As an expert witness, your forensic report is …

Read More

23

Apr'20

Digital forensics business: 4 Tips to Get Workers Compensation Insurance

| sponsored post | 4 Tips to Get Workers Compensation Insurance No matter what type of business you are running, …

Read More

21

Apr'20

Deepfence Runtime Threat Mapper | From deepfence

Deepfence Runtime Threat Mapper The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013