Filters
Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar
eQtalk is an original project of the eQtv TV channel. Oleksandr Glushchenko’s guest is the...
3 weeks agoWhat you need to know about smartphone security on the go
Discussion of measures of digital security in the context of mobilization in Russia September 21,...
4 weeks agoEverything You Need to Know About Google Advanced Search
In this video, we'll cover everything you need to know about Google's advanced search, including...
4 weeks agoHow do you know if your phone has been hacked?
Most of you store your most valuable data on your phone: correspondence, routes, payment information,...
4 weeks agoThe Quietest Cyber Catastrophe of 2025
You might think you use only safe, licensed software and know exactly where it comes...
1 month agoThe first world cyber war: confession of a Ukrainian hacker
Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...
2 months agoPavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals
eQtalk is an original project by the eQtv channel. The guest of the episode is...
2 months agoCybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoGetting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoGetting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoQuantum computer will reveal ALL your secrets (one day)
In the next 10-15 years, we will experience a quantum revolution - no, not like...
2 months agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoWho are Russian hackers attacking in Ukraine?
Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...
2 months agoHow your data is being sold. Protecting yourself from breaches
Your data is being traded on the Internet. Moreover, a criminal can buy not only...
2 months agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
2 months agoGetting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoHybrid Warfare 2.0
Drones of unknown origin have started appearing over European cities. Airports are being shut down,...
3 months agoHow Unrestricted AI Helps Criminals
Artificial intelligence has become a convenient tool for hackers and cybercriminals. We’re talking about “smart...
3 months agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
3 months agoGetting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
3 months ago