Using Postman in Hacking Blockchain Wallets

Learn how to use Postman in hacking blockchain wallets! This is a promotional tutorial of our 'Hacking Blockchain based APIs' course! The world is driven by APIs and the landscape of cybersecurity is changing at an extremely fast pace. Professionals are seeking to find a new edge, not only for themselves but for their clients' protection as well. This course will introduce you to blockchain APIs, tools we can use to compromise the API and gather more information that can be used in exploitation.

Play Video
Jeff OfficialNew Edition

Scammer Investigations on SnapChat

The world is filled with scammers, and online messengers, such as Snapchat, seem to be filled with them. In this article, I will be going over a couple of real-life scams. We will be breaking down the scam and taking some steps to help unmask the scammers.

Mar 28,2023

12 min read

Israel Torres OfficialNew Edition

Apple macOS Ransomware Where Art Thou?

Ransomware is a serious business, as it technologically encapsulates a large part of the criminal element of blackmail and extortion for profit through the payment of ransom. Additionally, techniques evolve quickly and can be updated through its communication network at a moment’s notice.

Mar 28,2023

22 min read

Kate Libby OfficialNew Edition

Ransomware

Ransomware is a type of malicious software that locks or encrypts a user’s computer, preventing them from accessing their data or programs, information, and resources, until they pay a ransom, hence the name “ransomware”.

Mar 27,2023

1954 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

18 min read

The Human Element: an Analysis of the Relationships Between Social Engineering and Ransomware Attacks 

To understand how the human element is exploited, this article aims to present an overview of ransomware and social engineering, discussing their relationship and focusing on how the human factor can be used as an agent to exploit becoming an attack vector.

Mar 27,2023

18 min read

Jeff OfficialNew Edition

Scammer Investigations on SnapChat

The world is filled with scammers, and online messengers, such as Snapchat, seem to be filled with them. In this article, I will be going over a couple of real-life scams. We will be breaking down the scam and taking some steps to help unmask the scammers.

Mar 28,2023

12 min read

Israel Torres OfficialNew Edition

Apple macOS Ransomware Where Art Thou?

Ransomware is a serious business, as it technologically encapsulates a large part of the criminal element of blackmail and extortion for profit through the payment of ransom. Additionally, techniques evolve quickly and can be updated through its communication network at a moment’s notice.

Mar 28,2023

22 min read

Kate Libby OfficialNew Edition

Ransomware

Ransomware is a type of malicious software that locks or encrypts a user’s computer, preventing them from accessing their data or programs, information, and resources, until they pay a ransom, hence the name “ransomware”.

Mar 27,2023

1954 min read

The Human Element: an Analysis of the Relationships Between Social Engineering and Ransomware Attacks 

To understand how the human element is exploited, this article aims to present an overview of ransomware and social engineering, discussing their relationship and focusing on how the human factor can be used as an agent to exploit becoming an attack vector.

Mar 27,2023

18 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

10 min read

Cloud Forensics (W56)

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.

Aug 26,2022

19 min read

KAAN KAYA Course

Windows Forensics (W55)

At the end of the training, the participants will be able to reach the level of knowledge to examine devices with Windows operating systems for the purpose of detecting suspicious activity. The course will focus on Windows 10 Operating System, but we know that there are a lot of common things with server operating systems. So Windows Server systems also could be our evidence source. The course’s material will also apply to Windows 11, as there are no changes compared to Windows 10 when looking from a forensics perspective. 

Jan 05,2022

10 min read

Natural Language Processing for OSINT & Threat Analysis (W54)

In this course, we apply Natural Language Processing to cyber threat analysis and OSINT, to assess and analyze data gained …

Aug 28,2021

7 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013