security Archives - Pentestmag

Pentesting high security environments

Joe McCray - Big Bang Theory This presentation focuses on pentesting high security environments, new ways of identifying/bypassing common …

May 16,2014

1 min read

Cyber Security in Oil and Gas 2014

Cyber Security in Oil and Gas 2014 27-29 January 2014 | Abu Dhabi, UAE The Cyber Security in Oil and …

Jan 08,2014

1 min read

Basics of Pentesting - PenTest StarterKit 02/13 TEASER

Dear PenTest Readers! We are pleased to present you the TEASER of the second issue of PenTest StarterKit. Last time …

Jun 14,2013

4 min read

How Biometrics Enhance Our Enterprise Security - PenTest Regular 10/12

no_access download id="201" format="4" ym_user_is_not package="1"ym_login register_text="Register" redirect="/pentest-regular-1012/" lostpassword_text="Lost password?"/ym_user_is_not /no_access private ym_user_is package="1" Click the link below to download …

Oct 02,2012

5 min read

Ross Moore OfficialNew Edition

The Importance of Supply Chain Security

The Importance of Securing the Supply Chain in the Global Business Environment The paramount importance of robust supply chain security …

Dec 07,2023

8 min read

AI in Cybersecurity: A Systematic Review and Research Agenda

Objective: Pioneering AI's Role in Cybersecurity This study explores how artificial intelligence (AI) transforms the world of cybersecurity and computer …

Dec 07,2023

20 min read

Prathibha Muraleedhara OfficialNew Edition

Subdomain Takeover – Security Risk, Impact, Automated Detection and Remediation

Abstract In the olden days, static websites were hosted on a server and the domain name DNS record was pointed …

Dec 07,2023

15 min read

Divya G ,Arun S OfficialNew Edition

Android SSL Pinning Bypass technique

What is SSLPinning? Ensuring secure communication is imperative during the development of mobile apps. This concern is addressed through the …

Dec 07,2023

29 min read

Aerospace Cybersecurity: Satellite Hacking (W53)

This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.

Jul 27,2023

11 min read

AutoSec Pro: Vehicle Cybersecurity Mastery (W52)

AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.

Jul 20,2023

15 min read

Rausson Course

Creating Advanced Ransomware with Golang (W51)

In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang

May 12,2023

6 min read

Mastering Splunk: A Comprehensive Guide (W50)

"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.

Mar 31,2023

18 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023