Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

The Cyber Cossacks: Hackers-Arise’s New School in Kharkiv, Ukraine!

Ukrainian officials have requested that Hackers-Arise open a new cybersecurity/hacker school in Ukraine to train the next generation of cyber cossacks to protect Ukraine.    These classes will begin in January 30, 2023 and is open to talented and motivated Ukraine citizens who are interested in protecting Ukraine from further Russian cyber attacks. Kharkiv is […]

Continue Reading

Hackers-Arise Announces a Partner Program for Cybersecurity Training Centers Around the World!

Now, your training program can partner with one of the best cybersecurity training programs in the world! Hackers-Arise now offers an partner program where your training center can; Use Hackers-Arise Affiliate name and logo Purchase books for your training program from Hackers-Arise at deep discounts Purchase videos and other training materials at deep discounts. Contract […]

Continue Reading

Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength

Welcome back my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our digital lives operate from radio signals, such as; Cellphones Drones Wi-Fi Bluetooth Near Field Payment Systems (NFC) Automobile Key Fobs Remote Control Systems such as home security RFID Satellite Signals GPS and so […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading