DEV Community

Namik Ahmadov profile picture

Namik Ahmadov

Penetration Testing | Network Security ๐ŸŒ | ๐ŸŽจ UI/UX Designer | ๐Ÿ“ฑ Senior Flutter Developer

Education

High School M.Rahim N7. Baku

Pronouns

He/him

Work

Nexus Inc.

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Comments
3 min read

Want to connect with Namik Ahmadov?

Create an account to connect with Namik Ahmadov. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

2
Comments
1 min read
๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

1
Comments
1 min read
๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

5
Comments 7
1 min read
AI's Impact on Future Business: Transformation Across Industries and for IT Professionals ๐ŸŒ

AI's Impact on Future Business: Transformation Across Industries and for IT Professionals ๐ŸŒ

1
Comments
1 min read
๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
loading...