Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies

As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with it. It appears that hackers have decided it is much easier and more lucrative to steal the cryptocurrencies than the traditional, government-issued fiat currencies ($, pounds, Euros, etc.) and the possible consequences, more […]

Continue Reading

Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!

You can become a Hackers-Arise MEMBER and receive the following; 1. “Linux Basics for Hackers v2” Video Companion ($99 value). 2. “CWA Prep” (Introduction to Hacking) Video ($99 value). 3. An Autographed copy of Master OTW’s new book “Getting Started Becoming a Master Hacker” ($30 value. You just pay shipping). 4. A digital copy of […]

Continue Reading

Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Election

On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia’s military intelligence agency. In this indictment, the U.S. Justice Department investigators (Robert Mueller’s team) provide granular detail of the step-by-step activity of these Russian hackers. Russia’s Internet Research Agency In this article, I would […]

Continue Reading

SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure

Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any nation’s economic health and well-being and are the primary target in any cyber war. These systems include the electrical grid, waster water systems, manufacturing, petrochemical refining, chemical processing and nearly any industrial process. If an adversary […]

Continue Reading

SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)

Welcome back, my aspiring SCADA/ICS cyberwarriors! Let’s begin by congratulating you on your foresight in committing to study SCADA/ICS hacking and security. This is certainly THE most important security issue this decade! In general, SCADA/ICS hacks have been of two types; Hack the protocols (modbus, DNP3, Profitnet, etc); Hack the Human Machine Interface (HMI) In […]

Continue Reading

The Art of Social Engineering training, April 13-15

Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social engineering is probably the greatest threat to our networks. Many of the most significant hacks in history had a social engineering element including; BlackEnergy3 Target POS 2016 Presidential Campaign and DCCC email hack RSA NY Times SONY Pictures and […]

Continue Reading