Search

3 min read
Open Source Intelligence (OSINT): The Versatile Email Address Search Tool
Welcome back, aspiring cyberwarriors and OSINT investigators! In our digital age, email addresses have become the keys to our online...
223 views


8 min read
Cyberwar Mission #3: Using QRCodes in Phishing and Social Media Attacks
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
1,091 views

10 min read
Open-Source Intelligence or OSINT: You Can’t Hide on Telegram!
Welcome back, aspiring cyberwarriors! A lot of people believe that the widely-used social media site, Telegram, offers them anonymity to...
487 views

34 min read
VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
523 views

5 min read
Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
252 views

7 min read
Physical Security: Single Pin Lockpicking for Hackers and Pentesters
Welcome back, my aspiring cyberwarriors! Physical security is often an overlooked area of cybersecurity. If the attacker can physical...
194 views

4 min read
Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare
Welcome back, aspiring cyberwarriors! Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This...
354 views


2 min read
Software Defined Radio Basics (Signals Intelligence) for Hackers, June 10-12
Welcome back, my aspiring open-source signals intelligence officers! A few years back, there was revolution in signals intelligence...
1,735 views

3 min read
OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
695 views

3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
4,049 views


4 min read
Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
522 views

1 min read
The Art and Science of Social Engineering in the Age of AI, February 11-13
Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social...
964 views


2 min read
Hackers-Arise Announces a New Training Program: The Path to Cyberwarrior!
In our continuing efforts to offer the best cybersecurity training on the planet, we are announcing new training program in 2025! Many of...
680 views

5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
2,359 views

5 min read
Password Spraying: An Often Effective Technique for Finding the Weakest Password in the Organization
Welcome back, my aspiring cyberwarriors! At the dawn of the Information Age, passwords emerged as the preeminent method for verifying...
411 views

3 min read
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
2,091 views


3 min read
Satellite Hacking: How Russia Knocked out the ViaSat System at the Outset of the Ukraine War
Welcome back, my aspirational cyberwarriors! Satellite hacking is the new frontier in cyber warfare! Satellites are an essential...
1,965 views


2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
3,560 views

3 min read
IP Camera Hacking: The FFmpeg Tool for Streaming Camera Video
Welcome back, aspiring cyberwarriors! As you know, Hackers-Arise has been deeply involved in the cyberwar to help save Ukraine from the...
2,780 views


1 min read
X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
252 views