#ethical-hacking

[ follow ]
#cybersecurity
fromHackernoon
1 year ago
Growth hacking

The TechBeat: The State of Cloud Storage: #Decentralize-Cloud (5/17/2025) | HackerNoon

Information security
fromHackernoon
2 years ago

Digital Defenders: Meet Syed Shahzaib Shah, Pakistan's Ethical Hacker Changing the Game | HackerNoon

Shahzaib Shah exemplifies how curiosity and dedication can propel impactful careers in cybersecurity, regardless of geographic or economic constraints.
NYC startup
fromBusiness Insider
2 months ago

Meet the Yale student and hacker moonlighting as a cybersecurity watchdog

Yale student Alex Schapiro discovered a critical security flaw in the dating app Cerca, underscoring the importance of ethical hacking for startups.
fromHackernoon
1 year ago
Growth hacking

The TechBeat: The State of Cloud Storage: #Decentralize-Cloud (5/17/2025) | HackerNoon

fromHackernoon
2 years ago
Information security

Digital Defenders: Meet Syed Shahzaib Shah, Pakistan's Ethical Hacker Changing the Game | HackerNoon

fromTheregister
1 month ago

How to trick ChatGPT into revealing Windows keys? I give up

By framing the interaction as a guessing game, the researcher exploited the AI's logic flow to produce sensitive data.
Privacy professionals
fromFuturism
1 month ago

AI Seizes Top Spot on Leaderboard for White Hat Hackers

An AI model has reached the top of a white hat hacking leaderboard for the first time.
fromHackernoon
4 months ago

Smarter SQL Injection Testing with AI-Enhanced SQLMap | HackerNoon

SQLMap-AI enhances SQLMap with AI capabilities to automate SQL injection tests, making assessments more efficient.
fromHackernoon
1 year ago

The TechBeat: Police Officers Are Turning Into Reddit Mods Thanks to Amazon's Neighborhood Watch (5/23/2025) | HackerNoon

'SnoopGame enhances quality assurance for both indie and AAA studios by streamlining processes, ensuring timely delivery, and building trust within the gaming development community.'
Growth hacking
fromHackernoon
3 months ago

Turn Your Android into a Cybersecurity Toolkit with Metasploit and Termux | HackerNoon

Before installing Metasploit 6, make sure your device meets the following requirements: Android device (version 7.0 or higher), Termux app (Download from F-Droid as the Play Store version is outdated), Stable internet connection, At least 1.5GB of free storage space.
Roam Research
Roam Research
fromHackernoon
7 years ago

The Ethical Hacker's Guide to Hacking WiFi with Termux | HackerNoon

WiFi networks remain vulnerable to hacking, and using tools like Wipwn can help assess their security responsibly.
[ Load more ]