1:33Introduction Personalized AI How to Jailbreak, Train, and Customize your own AI Assistant Hakin9Hakin9 Media125 views·1 year ago
7:29How Vision Models Work Architecture of Image Classifiers Adversarial AI Attacks Course HAKIN9Hakin9 Media131 views·1 year ago
16:10Enhancing Penetration Testing With Drones Aerial AssaultCombining Drones and Pentesting PenTestHakin9 Media242 views·1 year ago
0:25Game Hacking Live Workshop Invitation Anthony RedHatAugust Radzykewycz Hakin9Hakin9 Media64 views·1 year ago
7:57Q&A with Robert Thomas Build Ethical Hacking Arsenal with ChatGPT-4o Hakin9Hakin9 Media91 views·1 year ago
6:57Q&A with Hugo Le Belzic Pixel Trickery Outsmarting AI in Image Classification Models Hakin9Hakin9 Media266 views·1 year ago
22:03Hakin9 Webinar Online Class Network Security with Kate Libby & Anthony RadzykewiczHakin9 Media124 views·1 year ago
25:02Online Class Automotive Security with Anthony Radzykewycz & Ravi Rajput PenTest WEBINARHakin9 Media269 views·1 year ago
40:28Online Class Drone Pentesting with Steven Coffey and Timothy Hoffman PenTest WEBINARHakin9 Media506 views·2 years ago
27:55eForensics WEBINAR Incident Response and Forensic Fundamentals with Afshan NaqviHakin9 Media344 views·2 years ago
16:07CAN Replay Attack on Real Car AutoSec Pro Vehicle Cybersecurity Mastery PenTestHakin9 Media1.1K views·2 years ago
13:58Introduction to Kismet Kismet Wireless Network Monitoring and Analysis Hakin9Hakin9 Media2.1K views·2 years ago
15:10Advance Splunk Query Mastering Splunk A Comprehensive Guide PenTestHakin9 Media800 views·2 years ago
11:10CVEs & Exploits OSINT Tools & TTPs For Pentesters and Red Teamers PenTestHakin9 Media534 views·2 years ago
21:45Kismet Wireless Network Monitoring and Analysis 7 Most Common Wi-Fi Threats Hakin9Hakin9 Media424 views·2 years ago
8:30Aerospace Cybersecurity Satellite Hacking Detecting Attacks and Mitigation Strategies PenTestHakin9 Media2.0K views·2 years ago
51:00PenTest Mag's Live Webinar on Aerospace Cybersecurity with Timothy Hoffman & Angelina TsuboiHakin9 Media406 views·2 years ago
8:39Forensic Science Challenges Cloud Architecture Cloud Forensics eForensics MagazineHakin9 Media366 views·3 years ago
17:18E-Mails Leading to a Malicious Link Client-Side Exploitation Hakin9Hakin9 Media701 views·3 years ago