Blog

Latest news around the world

15

Jan'21

How to Find the Top Cybersecurity Companies in Your Area

How to Find the Top Cybersecurity Companies in Your Area |sponsored post| As enterprises and organizations set foot in the …

Read More

14

Jan'21

Exploiting Remote File Inclusion with SMB

Exploiting Remote File Inclusion with SMB by Nairuz Abulhul Recently working on the Sniper machine on hack the box, I …

Read More

28

Dec'20

Insecure Deserialization with JSON .NET

Insecure Deserialization with JSON .NET by Nairuz Abulhul Today, I will go over one of the OWASP’s top 10 vulnerabilities, …

Read More

22

Dec'20

How to Keep Yourself Protected While Playing Video Games Online

How to Keep Yourself Protected While Playing Video Games Online Video games have become more popular — and mainstream — than ever …

Read More

16

Dec'20

7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021

7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021 by Dr. Alina Matyukhina Smart technology is expected to grow …

Read More

08

Dec'20

Overall, I Believe Some of the Best Red Teamers Are Those Who Were Blue Teamers First (and vice versa)

"Overall, I Believe Some of the best Red Teamers are Those Who Were Blue Teamers First (and vice versa)" Interview …

Read More

03

Dec'20

Budget Optimisation Through PurpleTeaming

Budget Optimisation Through PurpleTeaming by Eliza-May Austin The Problem Arguably the biggest barrier to cybersecurity is cost. Many companies, regardless …

Read More

18

Nov'20

From SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass

From SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass by Daniel Santos For …

Read More

12

Nov'20

Top Cybersecurity Trends in 2020

Top Cybersecurity Trends in 2020 Cybersecurity in 2020 will greatly affect the global economy, businesses, governments, consumers, and the common …

Read More

06

Nov'20

Securing Endpoints in 2020: Proactive Security with XDR

Securing Endpoints in 2020: Proactive Security with XDR by Gilad David Maayan What is XDR? In the past, endpoints were …

Read More

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013