Filters
Hedra AI, LivePortrait, Heygen Expressive Photo Avatar: Best Tools for Facial Animation
Review of the three best latest neural networks for facial animation. From realistic avatars to...
6 days agoArtificial Intelligence: Can Machines Think Like Humans?
"AI is already capable of what was long considered uniquely human: creating texts, solving problems,...
6 days agoBest Free AI Tools in 2024
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
6 days agoPika Art - a neural network for video generation
Pika is a neural network video platform. Here pictures are "animated" and videos are created...
1 week agoHow does CERT-UA help energy companies, why is it important to connect to MISP?
Ukraine's energy facilities are hackers' top targets. CERT-UA's Evgeniy Briksin explains how the MISP platform...
2 weeks agoWho are Russian hackers attacking in Ukraine?
Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...
2 weeks agoThe danger of social networks
We continue to understand how scammers operate and how to protect yourself from fraudulent schemes...
3 weeks agoGuerrilla texting: encrypted text messages in case of an internet outage.
"The probability of Internet shutdown in Russia is high, but we can say with a...
3 weeks agoGetting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
3 weeks agoTips from Nadiyno.org: how to protect your Android SMART TV
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
4 weeks agoRunning Windows in a browser
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoServices That Will Help in OSINT Calculations in 2025
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 weeks agoHow to Block All Unwanted Ads on the Web
"Ads attack from all sides? They appear in browsers, mobile applications, YouTube and even Smart...
4 weeks agoLegal Analysis: Can You Sue AI Creators?
Today, together with a Ukrainian expert, we break down all the legal nuances of using...
1 month agoArtificial Intelligence. How Russia uses AI in information warfare
Russia is already using artificial intelligence in the war against Ukraine. To promote fakes and...
2 months agoFree Photoshop AI for Everyone
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoDocumenting war crimes
Latvian investigative journalist Inga Springe talks about her passion and power to change the world...
2 months agoGetting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoWhy is it important for organizations to establish cooperation with CERT-UA in advance?
How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...
2 months agoSatellite images of the Earth and what you can see
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months ago