How to Think Like a Hacker

Not only did I enjoy and learn from Khan's presentation, I had several follow-up conversations with him regarding cybersecurity, hacking, industry trends and much more.
I was impressed with his passion, expertise and role as a vCISO and cybersecurity practice lead, in addition to his hacking roles.
That's when I realized I was thinking like a hacker - not in the sense of malicious intent, but in the relentless pursuit of understanding how things really worked.
MK: I started my professional career with networking, learning how information travels across the Internet.
Even though I knew a lot about ethical hacking, I couldn't land a job in cybersecurity because I didn't have any relevant certifications or experience.
I offered basic cybersecurity services to nonprofits and startups for free, like assessing their security posture, making their devices more secure, setting up security tools, testing their systems for vulnerabilities and performing penetration testing.
MK: One of my earliest interests was getting into online investigations, mining the Internet for information.
Whether it was uncovering hidden data within image files or piecing together clues from social media profiles, I found satisfaction in using these skills to assist others when they had problems with hackers or stalkers.
MK: Most hacks nowadays rely heavily on social engineering tactics, where hackers don't target systems directly but instead exploit human vulnerabilities.
By leveraging publicly available information, hackers manipulate individuals into unwittingly aiding their schemes.
This is where OSINT comes into play as the initial step in a hacker's reconnaissance process.
The more information a hacker gathers about their target, the more potent their attack becomes.
Imagine if a hacker knows your specific interests or even your whereabouts based on your social media activity.
It's a sobering reminder of how crucial it is to safeguard our online presence and remain vigilant against such tactics.
MK: If you adopt a hacker's mindset, your priority should be safeguarding information they could exploit.
A key defense tactic is refraining from sharing personal details on social media platforms, such as your location, phone numbers, personal email addresses and family members' information.
Removing yourself from notorious data brokers and people-search websites can make it more challenging for malicious actors to obtain your home address or personal cellphone number.
MK: I love entertaining audiences with simple yet awe-inspiring hacks, putting them right at the heart of the action to witness the intricacies of cyber attacks firsthand.
My mission is to raise awareness about the methods hackers employ, empowering individuals to take meaningful steps toward protecting themselves.
By shedding light on how hackers hack, I aim to make security measures more impactful and relevant to everyone.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 17 Mar 2024 11:43:06 +0000


Cyber News related to How to Think Like a Hacker

Speaking Freely: Alison Macrina - In the US, I think about power that comes from, not just the government, but also rich individuals and how they use their money to influence things like free speech, as well as corporations. I think the best way that we can use our speech is using it ...
11 months ago Eff.org
Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin - Melissa Hathaway hasn't shied away from advising corporate boards and government leaders on cybersecurity policy since leaving the White House a decade ago. Currently a member of the Centre for International Governance Innovation's board of ...
11 months ago Darkreading.com
Hacker Conversations: Chris Evans, Hacker and CISO - Chris Evans is CISO and chief hacking officer at HackerOne. SecurityWeek's Hacker Conversations series seeks to understand the mind and motivations of hackers by talking to hackers. Evans challenges the common perception of both hackers and their ...
4 months ago Securityweek.com
Hacking Protected Java-Based Programs - This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from ...
10 months ago Feeds.dzone.com
Hacker 'ShinyHunters' Pleads Not Guilty in Cybercrime Case - A hacker known as 'ShinyHunters' has pleaded not guilty in a case of cybercrime. The hacker is accused of taking part in illegal activities to steal data from victims, including passwords, credit card information, and other personal details. The ...
1 year ago Blog.cloudflare.com
Tracers in the Dark: The Global Hunt for the Crime Lords of Crypto - Y is the author of a book I can very greatly recommend, with the fascinating title Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. As I dug into this cypherpunk world, around 2010 and 2011, I came upon this thing that ...
1 year ago Nakedsecurity.sophos.com
How to Think Like a Hacker - Not only did I enjoy and learn from Khan's presentation, I had several follow-up conversations with him regarding cybersecurity, hacking, industry trends and much more. I was impressed with his passion, expertise and role as a vCISO and cybersecurity ...
8 months ago Securityboulevard.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
7 months ago Eff.org
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
8 months ago Securityweek.com
GTA 6 Hacker: Life in Secure Hospital for Cybercrime Intent - The teenage hacker who leaked details about Grand Theft Auto 6 is now facing a life sentence in a guarded institution, which is a surprise development. The person, identified as Lapsus, was placed under an indefinite hospital order because of worries ...
10 months ago Cysecurity.news
Former Uber CISO Speaks Out, After 6 Years, on Data Breach, SolarWinds - Joe Sullivan arrived at his sentencing hearing on May 4 this year, prepared to go to jail had the judge not gone with a parole board's recommendation of probation. A federal jury convicted the former Uber CISO months earlier on two charges of fraud ...
11 months ago Darkreading.com
Ukraine Arrests Hacker for Assisting Russian Missile Strikes - Ukrainian security services have arrested a hacker for allegedly targeting government websites and providing intelligence to Russia to carry out missile strikes on the city of Kharkiv. Security Service of Ukraine revealed that its cyber unit has ...
9 months ago Infosecurity-magazine.com
Learning Strategies to Anticipate and Avoid Cybersecurity Risks - In order to be successful as a cybersecurity analyst, it is important to understand the values, traits, and thought processes of hackers, as well as the tools they use to launch their attacks. During a webinar called The Hacker Mindset, a Red Team ...
1 year ago Thehackernews.com
Analyzing KOSA's Constitutional Problems In Depth - EFF does not think KOSA is the right approach to protecting children online, however. As we've said before, we think that in practice, KOSA is likely to exacerbate the risks of children being harmed online because it will place barriers on their ...
8 months ago Eff.org
Report: Developers are most in demand on dark web - Hacker gangs often operate like businesses - they have salaries, working hours, clients and employees. To compete in a growing market, they are constantly looking for new talent with better skill sets, and they often use the same methods as ...
1 year ago Therecord.media
AWS Root vs IAM User: What to Know & When to Use Them - In Amazon Web Services, there are two different privileged accounts. One is defined as Root User and the other is defined as an IAM User. In this blog, I will break down the differences of an AWS Root User versus an IAM account, when to use one ...
1 year ago Beyondtrust.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
11 months ago Darkreading.com
What Is a Brute Force Attack? - A brute force attack is a type of cyber-attack that criminals use, in order to gain access to a computer system or the private data stored within. This type of attack involves a hacker attempting to guess information, such as passwords or access ...
1 year ago Heimdalsecurity.com
FBI Charges North Korean Hackers Over $100 Million Stolen in Crypto Hack - The FBI has recently charged a North Korean hacker in connection with the Harmony crypto hack from which the hacker allegedly stole over $100 million. The hacker, Jon Chang Hyok, is a member of the North Korean military intelligence agency, the ...
1 year ago Bleepingcomputer.com
U.S. No Fly List Data Breach Leaked on Hacker Forum - The U.S. No Fly List, a database of individuals who are barred from boarding commercial airlines due to security concerns, has been leaked on a hacker forum. The breach includes the full names and dates of birth of 1,817,233 individuals on the list ...
1 year ago Hackread.com
Major Spanish mobile carrier suffers three-hour outage after account takeover - One of Spain's biggest mobile carriers said it had restored services after a hacker caused an outage by manipulating crucial information about the company's internet infrastructure. It was unclear if the internet outages directly affected the ...
10 months ago Therecord.media
KubeCon 2023: Not Your Father's Tenable - Look, full disclosure, I've been working with Tenable for 20 since I think Ron Gula and Renaud started Tenable. Alan Shimel: That'd be around 2001, maybe, I'm going to guess because that's when I had started my security company. We get a lot of ...
11 months ago Securityboulevard.com
Changing How We Think About Technology - COMMENTARY. Knowledge is power, but it is only as powerful as the way organizations implement what they've learned and the subsequent decisions they make. All too often there is a flaw in thinking that is both tactical and short term in that we don't ...
11 months ago Darkreading.com
AWS re:Invent 2023: Passwordless Authentication - I'm here with Graeme Speak, CEO, and founder of BankVault. Graeme, it's such a pleasure to be with you here today. The really big one that we're focused on is called MasterKey, which provides passwordless access to web login portals. Can you explain ...
10 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)