Hackerspot
Subscribe
Sign in
Home
Podcast
AI & LLM
Awareness
Tools
WriteUps
Automation
About
Latest
Top
Practical Examples for Network Recon & Service Identification in C#
A hands-on guide for developers, blue teamers, and ethical hackers
Dec 20
•
Mehmet Turkuzan
and
Hackerspot Team
3
2
Let's Talk About the Security of AI Agents
AI agents introduce persistence, execution power, tool control, multi-agent orchestration, and unpredictable planning loops
Dec 13
•
Chady
and
Hackerspot Team
12
1
XSStrike: A Smarter Scanner for Pentesters
XSStrike approaches XSS testing differently. Instead of blindly injecting payloads, it analyzes the application’s response, understands the injection…
Dec 6
•
Chady
and
Hackerspot Team
15
3
November 2025
Secretive: Protecting SSH Keys on macOS
If you use SSH keys on a Mac, there’s a great tool that helps protect them better.
Nov 28
•
Chady
and
Hackerspot Team
13
3
Practical Port Probing: Build a Fast and Safe TCP Port Scanner in C#
This guide teaches you how to build a fast and safe TCP port scanner in C#.
Nov 22
•
Mehmet Turkuzan
and
Hackerspot Team
16
3
October 2025
From Vanity to Value: Building Better Security Metrics
Are your security dashboards full of numbers but short on meaning?
Oct 11
•
Chady
4
A Simple Guide to SSL/TLS
How Secure Website Connections Keep You Safe
Oct 4
•
Hackerspot Team
7
1
September 2025
Accepting Risks Forever Is Not Cool
Why Permanent Risk Acceptance Hurts Vulnerability Management
Sep 27
•
Hackerspot Team
5
An Analysis of Promptware Attacks Against LLM-Powered Assistants
The incorporation of Large Language Models (LLMs) into production-level applications has introduced very complicated security challenges.
Sep 19
•
Hackerspot Team
3
May 2025
Cisco’s New Open-Source Cybersecurity LLM Model
As cybersecurity threats escalate in volume and complexity, security professionals face a critical challenge: how to scale their intelligence and…
May 10
•
Chady
4
Google Calls for Industry-Wide Standards to Eliminate Memory Safety Vulnerabilities
Google is urging the tech industry to embrace standardized practices to eliminate memory safety vulnerabilities—one of the most persistent and damaging…
May 8
•
Chady
and
Hackerspot Team
2
April 2025
API Security: From Basics to Modern Threats
API security has evolved from basic authentication to defending against complex threats.
Apr 25
•
Chady
and
Hackerspot Team
7
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts