top of page

ALL POSTS
Search


THE ART OF INVISIBILITY
"The Art of Invisibility" by Kevin Mitnick is an eye-opening exploration of the digital threats that surround us and a manual on how to...

Yaniv Hoffman
Jul 2, 20232 min read
0


GETTING STARTED BECOMING A MASTER HACKER
In "Getting Started Becoming a Master Hacker," OccupyTheWeb provides an insightful guide to the world of ethical hacking...

Yaniv Hoffman
Jul 2, 20232 min read
2


HACKING APIS: A GUIDE TO EXPLOITING API VULNERABILITIES
Corey J. Ball's "Hacking APIs: A Guide to Exploiting API Vulnerabilities" is a deep dive into the world of API...

Yaniv Hoffman
Jul 2, 20232 min read
3


LINUX BASICS FOR HACKERS
"Linux Basics for Hackers" by OccupyTheWeb is an indispensable guide for anyone embarking on a journey into the realm of cybersecurity...

Yaniv Hoffman
Jul 2, 20232 min read
1


PEGASUS
"Pegasus" by Laurent Richard and Sandrine Rigaud provides a sobering, yet utterly fascinating, exploration of the nebulous and often...

Yaniv Hoffman
Jul 2, 20232 min read
9


IF IT'S SMART, IT'S VULNERABLE
"If It's Smart, It's Vulnerable," Mikko Hypponen has assembled a compelling and cautionary tale of the risks and ramifications inherent...

Yaniv Hoffman
Jul 2, 20232 min read
6


This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
In "This Is How They Tell Me the World Ends," Nicole Perlroth serves up an engrossing narrative that expertly blends real-world reporting...

Yaniv Hoffman
Jul 2, 20232 min read
18


RTX 4090: Unleashing the Power of Password Cracking
Hi everyone, Yaniv Hoffman here back with another blog. Today, we have an exciting topic to discuss that will surely pique the interest...

Yaniv Hoffman
Jun 30, 20236 min read
2


Exploring DarkBERT: AI's Secret Weapon to Tackle the Dark Web
Hi everyone, its Yaniv Hoffman here back with another blog. ChatGPT became an household name recently but did you know that there is a...

Yaniv Hoffman
Jun 30, 20236 min read
5


Weak Passwords | Consequences and best practices
A weak password is simply defined as a password that can be easily guessed or judged by humans or computers. Since, there has been an...

Yaniv Hoffman
Oct 7, 20214 min read
1,088


Data security on mobile devices
What is mobile security? Mobile security is said to be the measures taken to protect critical and sensitive information on modern smart...

Yaniv Hoffman
Oct 7, 20214 min read
28


Getting Into Cybersecurity Career And Making Choices For Growth
“How you can get into a cyber-security career? Which certificates required? What’s my recommendation?” As the world continues to advance,...

Yaniv Hoffman
Sep 9, 20216 min read
47


10 Reasons To Consider Cyber Security For Any Business
With the rise in the use of internet worldwide, cyberattacks have been active. In the past few years, there has been seen a sudden rise...

Yaniv Hoffman
Sep 8, 20214 min read
21


What Is Ethical Hacking
The need for ethical hacking The basic concept of cybersecurity threat refers to a malicious act, which can lead to stealing on sensitive...

Yaniv Hoffman
Sep 8, 20215 min read
21


How Does The Dark Web Work
The internet has changed everything from the way we work to the way we play, way we learn and definitely the way we live. There is so...

Yaniv Hoffman
Sep 4, 20216 min read
13



Yaniv Hoffman
Aug 6, 20210 min read
1


Cloud Native Technology will Prevail in 5G Networks
Communication Service Providers (CSPs) are entering a new phase of network cloudification to transform their network infrastructure...

Yaniv Hoffman
Jul 24, 20214 min read
17


Beware the top three blind spots that precede cloud data breaches
Moving workloads to the cloud has led organizations and IT administrators to lose control over workloads and relinquish many critical...

Yaniv Hoffman
Jul 20, 20213 min read
9


Welcome to my BLOG
Welcome to the launch of my new YanivHoffman website and my first personal blog post! My name is Yaniv Hoffman, I am 44 years old, born...

Yaniv Hoffman
Jul 6, 20211 min read
24
bottom of page