The growing danger of incidents involving cybersecurity is a significant concern that comes with the digital age. Protecting our digital environment has become a crucial problem as society becomes increasingly dependent on technology. The best choice, as far as computer security is concerned, is never to act after the attacks have occurred, but to prevent them from happening. Using a pentesting platform like HuntDown is one of those tools that can help you find vulnerabilities or otherwise get to know your system better to improve it and make it more effective against cyber attacks. Furthermore, with the development of the feature on which the thesis is based, the platform will be made more automated making it even easier to use by users wh...
Since the term "Cyber threat hunting" was introduced in 2016, there have been a rising trend of proa...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
There has been a general consensus in the computer security research community that the usability of...
Nowadays, cybersecurity has become a hot debate topic because of the rapid development of the Intern...
With a growing number of users getting connected to the Internet and given their growing reliance on...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
“The Internet is the crime scene of the 21st century.” The complexity of cybercrimes is constantl...
In the modern world the technology is rising quite rapidly. In order to operate our industries, gove...
In the world of evolving technologies, we are being driven by online transaction, AI technologies an...
Cyberspace is increasingly attacked and there are limited means of mitigating this act. This is usua...
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber securit...
Modern web development comes with a variety of challenges that developers must consider, such as acc...
The advent of digital media, Internet, web and online social media has drawn the attention of releva...
: Over the years, Information and Communication Technology (ICT) has turned our cultures and has ...
Cybersecurity is an important field that deals with the protection of computer systems, networks, an...
Since the term "Cyber threat hunting" was introduced in 2016, there have been a rising trend of proa...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
There has been a general consensus in the computer security research community that the usability of...
Nowadays, cybersecurity has become a hot debate topic because of the rapid development of the Intern...
With a growing number of users getting connected to the Internet and given their growing reliance on...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
“The Internet is the crime scene of the 21st century.” The complexity of cybercrimes is constantl...
In the modern world the technology is rising quite rapidly. In order to operate our industries, gove...
In the world of evolving technologies, we are being driven by online transaction, AI technologies an...
Cyberspace is increasingly attacked and there are limited means of mitigating this act. This is usua...
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber securit...
Modern web development comes with a variety of challenges that developers must consider, such as acc...
The advent of digital media, Internet, web and online social media has drawn the attention of releva...
: Over the years, Information and Communication Technology (ICT) has turned our cultures and has ...
Cybersecurity is an important field that deals with the protection of computer systems, networks, an...
Since the term "Cyber threat hunting" was introduced in 2016, there have been a rising trend of proa...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
There has been a general consensus in the computer security research community that the usability of...