Search

5 min read
Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
92 views

4 min read
Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare
Welcome back, aspiring cyberwarriors! Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This...
140 views

6 min read
Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
203 views


2 min read
Software Defined Radio Basics (Signals Intelligence) for Hackers, June 10-12
Welcome back, my aspiring open-source signals intelligence officers! A few years back, there was revolution in signals intelligence...
1,591 views

1 min read
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the...
2,333 views

3 min read
OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
573 views

3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3,506 views


4 min read
Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
391 views

1 min read
The Art and Science of Social Engineering in the Age of AI, February 11-13
Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social...
905 views


2 min read
Hackers-Arise Announces a New Training Program: The Path to Cyberwarrior!
In our continuing efforts to offer the best cybersecurity training on the planet, we are announcing new training program in 2025! Many of...
674 views

5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
2,163 views

5 min read
Password Spraying: An Often Effective Technique for Finding the Weakest Password in the Organization
Welcome back, my aspiring cyberwarriors! At the dawn of the Information Age, passwords emerged as the preeminent method for verifying...
354 views

3 min read
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
1,942 views


3 min read
Satellite Hacking: How Russia Knocked out the ViaSat System at the Outset of the Ukraine War
Welcome back, my aspirational cyberwarriors! Satellite hacking is the new frontier in cyber warfare! Satellites are an essential...
1,892 views


2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
3,505 views


6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
6,665 views


3 min read
Strategies for Password Cracking in Cybersecurity
Welcome back, my aspiring cyberwarriors! People often ask, how do I crack passwords? The answer is that there are many ways and it is...
325 views

3 min read
IP Camera Hacking: The FFmpeg Tool for Streaming Camera Video
Welcome back, aspiring cyberwarriors! As you know, Hackers-Arise has been deeply involved in the cyberwar to help save Ukraine from the...
2,503 views

5 min read
Can Artificial Intelligence Be Used to Track Your Location?
Welcome back, my aspiring cyberwarriors! We all know that when pictures are taken, they contain Exif data. This EXIF data includes such...
573 views


1 min read
X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
246 views