93 videos

Filters

0:00 04:17:55
Clear
Hedra AI, LivePortrait, Heygen Expressive Photo Avatar: Best Tools for Facial Animation 10:17

Hedra AI, LivePortrait, Heygen Expressive Photo Avatar: Best Tools for Facial Animation

Review of the three best latest neural networks for facial animation. From realistic avatars to...

6 days ago
Artificial Intelligence: Can Machines Think Like Humans? 46:05

Artificial Intelligence: Can Machines Think Like Humans?

"AI is already capable of what was long considered uniquely human: creating texts, solving problems,...

6 days ago
Best Free AI Tools in 2024 00:32

Best Free AI Tools in 2024

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

6 days ago
Pika Art - a neural network for video generation 16:30

Pika Art - a neural network for video generation

Pika is a neural network video platform. Here pictures are "animated" and videos are created...

1 week ago
How does CERT-UA help energy companies, why is it important to connect to MISP? 01:28

How does CERT-UA help energy companies, why is it important to connect to MISP?

Ukraine's energy facilities are hackers' top targets. CERT-UA's Evgeniy Briksin explains how the MISP platform...

2 weeks ago
Who are Russian hackers attacking in Ukraine? 01:08

Who are Russian hackers attacking in Ukraine?

Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...

2 weeks ago
The danger of social networks 14:26

The danger of social networks

We continue to understand how scammers operate and how to protect yourself from fraudulent schemes...

3 weeks ago
Guerrilla texting: encrypted text messages in case of an internet outage. 06:12

Guerrilla texting: encrypted text messages in case of an internet outage.

"The probability of Internet shutdown in Russia is high, but we can say with a...

3 weeks ago
Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links 11:08

Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

3 weeks ago
Tips from Nadiyno.org: how to protect your Android SMART TV 09:30

Tips from Nadiyno.org: how to protect your Android SMART TV

Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...

4 weeks ago
Running Windows in a browser 00:30

Running Windows in a browser

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

4 weeks ago
Services That Will Help in OSINT Calculations in 2025 00:33

Services That Will Help in OSINT Calculations in 2025

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

4 weeks ago
How to Block All Unwanted Ads on the Web 06:01

How to Block All Unwanted Ads on the Web

"Ads attack from all sides? They appear in browsers, mobile applications, YouTube and even Smart...

4 weeks ago
Legal Analysis: Can You Sue AI Creators? 38:13

Legal Analysis: Can You Sue AI Creators?

Today, together with a Ukrainian expert, we break down all the legal nuances of using...

1 month ago
Artificial Intelligence. How Russia uses AI in information warfare 23:43

Artificial Intelligence. How Russia uses AI in information warfare

Russia is already using artificial intelligence in the war against Ukraine. To promote fakes and...

2 months ago
Free Photoshop AI for Everyone 00:32

Free Photoshop AI for Everyone

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

2 months ago
Documenting war crimes 07:56

Documenting war crimes

Latvian investigative journalist Inga Springe talks about her passion and power to change the world...

2 months ago
Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions 14:28

Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Why is it important for organizations to establish cooperation with CERT-UA in advance? 01:00

Why is it important for organizations to establish cooperation with CERT-UA in advance?

How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...

2 months ago
Satellite images of the Earth and what you can see 00:39

Satellite images of the Earth and what you can see

Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.

2 months ago