Pentestmag

Drone Cybersecurity: Ensuring the Security of Unmanned Aerial Vehicles

Drones are also known as unmanned aerial vehicles, or UAVs, and their use and attractiveness have proliferated. Although drones were …

Jul 16,2024

5 min read

Unmasking Phishing: Why Browser Security Strategies Are Essential in Today’s Digital World

Phishing attacks have become more cunning, leveraging legitimate domains and sophisticated tactics to slip past traditional security measures. This calls …

Jul 15,2024

4 min read

Drones and Security: Understanding the Risks and Mitigating Threats

In the modern era of technology, drones have become ubiquitous, serving many purposes, from recreational activities to critical military operations. …

Jul 12,2024

6 min read

Aerial Assault: Combining Drones and Pentesting (W54)

Enter a short description of the course.This course explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. As drones become more accessible and advanced, their potential for both offensive operations and defensive strategies grows. Participants will learn how to leverage drones for penetration testing while understanding the opportunities and challenges presented by aerial platforms in cybersecurity. This course covers the technical foundations of drones, offensive drone operations, defensive strategies against drones, and the ethical and legal implications of drone use in cybersecurity.

Mar 18,2024

5 min read

CVE-2024-6387 Vulnerability Checker

This Python script is designed to check SSH servers for the CVE-2024-6387 vulnerability, specifically targeting the recently discovered regreSSHion, which …

Jul 11,2024

5 min read

Steve Coffey OfficialNew Edition

Aerial Assault: Exploring the Intersection of Drones and Cybersecurity

In today's rapidly evolving digital landscape, the fusion of drone technology and cybersecurity is setting the stage for revolutionary advancements. …

Jul 09,2024

5 min read

Rhonda Johnson OfficialNew Edition

Reconnaissance Micro-Drone Penetration Testing For Electronic Warfare Operations

Reconnaissance micro-drone penetration testing for electronic warfare operations is a critical military strategy that involves deploying small, unmanned aerial vehicles …

Jul 08,2024

7 min read

Steve Coffey, Timothy Hoffman OfficialNew Edition

Transitioning from Public Safety to Cybersecurity and Drone Technology Integration interview with Steve Coffey

Timothy Hoffman: Thank you for sharing your background with us. Can you tell us a bit about your journey? I …

Jul 04,2024

5 min read

Vaibhav Malik OfficialNew Edition

The Evolving Landscape of Application Security and Zero Trust: An Interview with Vaibhav Malik

In an increasingly digital world, application security and Zero Trust architectures have become critical components of modern cybersecurity strategies. To …

Jul 02,2024

8 min read

Aerial Assault: Combining Drones and Pentesting (W54)

Enter a short description of the course.This course explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. As drones become more accessible and advanced, their potential for both offensive operations and defensive strategies grows. Participants will learn how to leverage drones for penetration testing while understanding the opportunities and challenges presented by aerial platforms in cybersecurity. This course covers the technical foundations of drones, offensive drone operations, defensive strategies against drones, and the ethical and legal implications of drone use in cybersecurity.

Mar 18,2024

8 min read

Aerospace Cybersecurity: Satellite Hacking (W53)

This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.

Jul 27,2023

11 min read

AutoSec Pro: Vehicle Cybersecurity Mastery (W52)

AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.

Jul 20,2023

15 min read

Rausson Course

Creating Advanced Ransomware with Golang (W51)

In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang

May 12,2023

6 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023