Search


Satellite Hacking: How Russia Knocked out the ViaSat System at the Outset of the Ukraine War
Welcome back, my aspirational cyberwarriors! Satellite hacking is the new frontier in cyber warfare! Satellites are an essential...
3 min read
2,253 views


Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
2 min read
3,709 views

IP Camera Hacking: The FFmpeg Tool for Streaming Camera Video
Welcome back, aspiring cyberwarriors! As you know, Hackers-Arise has been deeply involved in the cyberwar to help save Ukraine from the...
3 min read
3,417 views


X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
1 min read
296 views


Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
3 min read
749 views

Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
4 min read
4,088 views


Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
5 min read
749 views

The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
1 min read
18,818 views

Software Defined Radio (SDR) for Hackers: Setting Up Your HackRF One
Welcome back, my aspiring SDR hackers! In the previous tutorials in this series, we used the inexpensive but capable RTL-SDR for our...
3 min read
59,093 views


Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
5 min read
930 views


Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
5 min read
1,186 views


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
797 views

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
3 min read
510 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
560 views

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2 min read
2,333 views

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
5 min read
1,695 views


Python Basics for Hacker is Now Available for Pre-Order
Due to overwhelming demand from our students and readers, Python Basics for Hackers is now available for preorder. We estimate a...
1 min read
2,256 views

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
5 min read
913 views


Hacker Legend Profiles: The Very Strange Case of Jeremy Hammond
Welcome back, my aspiring cyberwarriors! In this new series, I want to profile some the most important hackers in history. I'm hoping...
3 min read
2,087 views


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,161 views