essential knowledge

AirAsia Partners with Hacken to Ensure the Highest Level of Data Security
  • Network
  • case study
  • +5

AirAsia Partners with Hacken to Ensure the Highest Level of Data Security

March 14. AirAsia, Asia’s largest low-cost carrier by passengers, has partnered with Estonian cybersecurity consultancy company Hacken to complement their security strategy to ensure the best user experience for their passengers. Under the agreement, Hacken will perform an advanced secure code review of AirAsia applications to support the company with PCI DSS compliance requirements. The

26 Mar 2019

Bug Bounty for Crypto Exchanges
  • Insights
  • analitycal assessment
  • +8

Bug Bounty for Crypto Exchanges

Table of Contents The merger of crypto and crypto hacks: A Short History Crypto exchange hacks Statistics Advantages of BB Can a researcher blackmail me? Afterword The merger of crypto and crypto hacks: A Short History 2009 — the bitcoin network was born when Satoshi Nakamoto mined the first block of the chain, known as

15 Jan 2019

White, Grey, and Black Box Testing
  • Discover
  • cybersecurity
  • +1

White, Grey, and Black Box Testing

Penetration testing will allow you to avoid cybersecurity-related incidents that can damage the reputation of your company and cause a loss of significant funds. A successful implementation of exploiting the vulnerabilities will allow demonstrating possible ways of penetration into the informational systems as well as detecting critical security issues. It means there will be a

20 Dec 2018

EOS Smart Contracts Audit Overview
  • Discover
  • blockchain
  • +2

EOS Smart Contracts Audit Overview

What is a smart contract audit and why is it necessary to perform? In general, an audit is performed to highlight any potential problems with a contract. There are, however, other areas where auditing can be used to test systems, networks, and applications in addition to checking smart contracts for bugs, vulnerabilities, and any loopholes.

17 Dec 2018

What is the Cost of Security Assessment?
  • Discover
  • cybersecurity
  • +1

What is the Cost of Security Assessment?

Cybersecurity assessment services are a type of service in which a specific system is checked for any security flaws. Professional cybersecurity services are not an option exclusive to large-scale corporations. If you: then you definitely should hire specialists to keep your company and employees protected. Once configured by all the security policies, your network will

19 Nov 2018

Static Analysis of Android Mobile Applications — MobSF Manual
  • Discover
  • analitycal assessment
  • +3

Static Analysis of Android Mobile Applications — MobSF Manual

Static analysis is one of the stages of testing a mobile application. According to Hacken pentesters, the most convenient open source framework is MobSF. Based on the framework, we’ll show how the static analysis for Android applications is performed; mind that the Android application analysis doesn’t require performing any application functions. Basic Information about MobSF

9 Nov 2018

How Sensitive is Your Non-Sensitive Data
  • Discover
  • cybersecurity
  • +2

How Sensitive is Your Non-Sensitive Data

In today’s digital world keeping private data like emails, phone numbers, names, addresses or IPs secure from theft or vulnerability is not as easy as putting a lock on a door. With the ability to share, store and transmit sensitive data across computer systems we have created another problem. Even taking all the precautions doesn’t

31 Oct 2018

How much does Penetration Test Cost, or Price of your Security
  • Discover
  • cybersecurity
  • +1

How much does Penetration Test Cost, or Price of your Security

Request Consutation Security is an essential part of any business. There are multiple ways a system can become compromised which is why one needs to ensure high quality modern technologies are applied, such as SSL certificates, firewalls, physical machinery protection, and many others. To keep your company safe from potential security attacks you will need

20 Sep 2018

Smart Contract Bug Bounties: Beginner’s Guide To Web3 Bug Hunting
  • Discover
  • blockchain
  • +2

Smart Contract Bug Bounties: Beginner’s Guide To Web3 Bug Hunting

In this bug bounty guide, educational resources, useful tools and expert tips for smart contract bug hunters.

23 Aug 2018

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo