top of page
5 min read
SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
14,332 views
2 min read
Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
3,537 views
1 min read
Hackers-Arise announces a new program: "Break Down the Digital Iron Curtain" program
Welcome back my aspiring cyberwarriors! So many people have written that they would love to participate in Hackers-Arise' training...
1,115 views
4 min read
Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly...
6,773 views
2 min read
Hackers-Arise Featured in Norway Public Television Documentary on the Cyberwar in Ukraine
The war in Ukraine began February 24, 2022 when Putin marched his troops from Belorussia to invade Ukraine and attempt to capture the...
2,551 views
1 min read
Hackers-Arise Announces a New Class! Using Artificial Intelligence in Cybersecurity
Welcome back, my cyberwarriors! In recent months, AI or artificial intelligence has made great strides toward becoming a tool we may use...
6,466 views
3 min read
Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
6,769 views
2 min read
Why YOU Should Study Software Defined Radio (SDR) for Hackers!
Hacking radio signals (RF) IS the leading edge of cybersecurity! So many applications in our modern life use radio frequency elements...
14,104 views
3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3,125 views
2 min read
What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
5,339 views
bottom of page