Search

Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec
Welcome back, aspiring cyberwarriors! In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging...
5 min read
312 views

The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
5 min read
3,367 views

Open-Source Intelligence(OSINT): Sherlock - The Ultimate Username Enumeration Tool
Welcome back, aspiring OSINT investigators! Social media platforms hold a wealth of personal and professional information, making them...
2 min read
2,298 views

Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2
Welcome back, aspiring cyberwarriors! During reconnaissance, our goal is to identify vulnerable services within our target’s network. To...
3 min read
978 views

Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
5 min read
456 views

Open Source Intelligence (OSINT): Mosint, The Versatile Email Address Search Tool
Welcome back, aspiring cyberwarriors and OSINT investigators! In our digital age, email addresses have become the keys to our online...
3 min read
1,843 views


Cyberwar Mission #3: Using QRCodes in Phishing and Social Media Attacks
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
8 min read
1,430 views

Open-Source Intelligence or OSINT: You Can’t Hide on Telegram!
Welcome back, aspiring cyberwarriors! A lot of people believe that the widely-used social media site, Telegram, offers them anonymity to...
10 min read
4,136 views

VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
34 min read
1,211 views

Physical Security: Single Pin Lockpicking for Hackers and Pentesters
Welcome back, my aspiring cyberwarriors! Physical security is often an overlooked area of cybersecurity. If the attacker can physical...
7 min read
389 views

Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare
Welcome back, aspiring cyberwarriors! Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This...
4 min read
722 views

Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
6 min read
547 views


Software Defined Radio Basics (Signals Intelligence) for Hackers, June 10-12
Welcome back, my aspiring open-source signals intelligence officers! A few years back, there was revolution in signals intelligence...
2 min read
1,986 views

Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the...
1 min read
2,392 views

OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
3 min read
914 views

Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3 min read
4,567 views

The Art and Science of Social Engineering in the Age of AI, February 11-13
Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social...
1 min read
1,138 views


Hackers-Arise Announces a New Training Program: The Path to Cyberwarrior!
In our continuing efforts to offer the best cybersecurity training on the planet, we are announcing new training program in 2025! Many of...
2 min read
786 views

Password Spraying: An Often Effective Technique for Finding the Weakest Password in the Organization
Welcome back, my aspiring cyberwarriors! At the dawn of the Information Age, passwords emerged as the preeminent method for verifying...
5 min read
614 views

NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
3 min read
3,799 views