Search


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
797 views

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
3 min read
510 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
560 views

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
5 min read
913 views

IoT Hacking: RFID Basics for Hackers
Welcome back, my aspirational cyberwarriors! IoT devices are increasing at an exponential rate in our digital world. These IoT devices...
5 min read
2,318 views


IoT Hacking: How We Hacked the Dahua Cameras In Ukraine and Russia
Welcome back, my aspiring cyberwarriors! As you know, Hackers-Arise played a key role in the Ukrainian resistance to Russia's brutal...
3 min read
2,514 views

The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
4 min read
768 views


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,364 views


Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
4 min read
1,392 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,000 views


Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
4 min read
1,441 views


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,161 views

Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
6 min read
1,720 views


Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 min read
65,557 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,175 views

DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
4 min read
15,597 views

50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
1 min read
2,617 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,125 views


SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
5 min read
14,965 views


Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
6 min read
2,083 views