Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: Cyber Warfare – Truth, Tactics, and Strategies

Uday Mittal June 17, 2022

Book Review: Cyber Warfare – Truth, Tactics, and Strategies

The Humble Bundle recently launched a Cyber Warfare book bundle. The bundle contained 24 books but Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham intrigued me so I decided to pick this book as my next read. It was published in February 2020 by Packt Publishing. This is not the only book […]

Filed Under: Book Reviews Tagged With: cyber-warfare, cybersecurity, Cybersecurity books, deep fakes

Would Trump trump his promise on Cybersecurity?

Uday Mittal November 16, 2016 Leave a Comment

Would Trump trump his promise on Cybersecurity?

It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]

Filed Under: Awareness, Opinion Tagged With: Cyber Security, cyber-warfare, Narendra Modi, Trump

Anonymous India Strikes Back

Uday Mittal September 28, 2015 Leave a Comment

Anonymous India Strikes Back

Whether it’s cricket ground or battle-ground, things always heat up when the two sides are India and Pakistan. Off late, they’ve found a new frontier to battle, the cyber-ground. Both the nations have been in the state of unofficial cyber-warfare since 2010 and it doesn’t seem to end any time soon. Yesterday, a Pakistani hacker by […]

Filed Under: Hacks Tagged With: anonymous india, cyber-warfare, hacktivists, hell shield hackrs, mallu cyber soldiers

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress