1 day ago5 min read
Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
55 views
6 days ago5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
311 views
Nov 265 min read
Exploit Development: Building Your Own Fuzzer with BASH
Welcome back, my aspiring cyberwarriors! In the digital battleground of cybersecurity, web application fuzzing stands as a critical...
519 views
Nov 52 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
1,584 views
Nov 45 min read
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
967 views
Nov 11 min read
Bluetooth Hacking, January 14-16
Bluetooth Hacking is one of the most under-appreciated threats in our IoT World! For years, cybersecurity researchers considered...
1,316 views
Oct 301 min read
Python Basics for Hacker is Now Available for Pre-Order
Due to overwhelming demand from our students and readers, Python Basics for Hackers is now available for preorder. We estimate a...
1,608 views
Oct 216 min read
So...You Thought Your VPN Was Keeping you Safe and Secure?
Welcome back, my aspiring cyberwarriors! Although VPN's are sold to keep you safe and secure online, many of them are far from from safe...
2,713 views
Oct 201 min read
Data Science Analytics for Cybersecurity, December 17-19
Welcome back, my cyberwarriors! Right now, we are on the advent of the Age of Artificial Intelligence ! You will either embrace this new...
487 views
Oct 185 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
613 views