55 videos

Filters

0:00 03:09:48
Clear
Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED 54:36

Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED

Russian security forces can hack any phone and gain access to your correspondence using automated...

1 week ago
Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions 14:28

Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 week ago
Why is it important for organizations to establish cooperation with CERT-UA in advance? 01:00

Why is it important for organizations to establish cooperation with CERT-UA in advance?

How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...

2 weeks ago
Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network 10:08

Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 4 (SSRF) — Delete a user. Python, Burp Suite 15:22

Getting ready for the cybersecurity certification exam — Lab 4 (SSRF) — Delete a user. Python, Burp Suite

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site 17:46

Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0 19:51

Getting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
What you need to know about smartphone security on the go 34:28

What you need to know about smartphone security on the go

Discussion of measures of digital security in the context of mobilization in Russia September 21,...

1 month ago
Why do enemy hackers constantly attack Ukrainian media? 00:25

Why do enemy hackers constantly attack Ukrainian media?

Russian hackers regularly attack Ukrainian media outlets not only to disable them, but also to...

1 month ago
Why is Ukraine's experience in countering Russian hackers important for other countries? 01:25

Why is Ukraine's experience in countering Russian hackers important for other countries?

Ukraine confronts Russian cyberattacks on a daily basis, gaining unique practical experience. A CERT-UA specialist...

1 month ago
Cyberspace Defense: How does CERT-UA interact with international organizations? 01:06

Cyberspace Defense: How does CERT-UA interact with international organizations?

CERT-UA cooperates with international cyber incident response teams to effectively protect cyberspace. These teams are...

1 month ago
How does CERT-UA respond to cyber incidents? 02:07

How does CERT-UA respond to cyber incidents?

What does CERT-UA do when an organization suffers from a cyberattack? Deputy Head Evgeniy Bryksin...

1 month ago
Do organizations need cybersecurity specialists? 01:00

Do organizations need cybersecurity specialists?

To strengthen cybersecurity, it is important for organizations to engage specialized specialists. Evgeniya Nakonechnaya from...

1 month ago
What do CERT-UA specialists do? 00:33

What do CERT-UA specialists do?

CERT-UA investigates cyber incidents, prevents attacks, and strengthens the cybersecurity of Ukrainian organizations. Deputy Team...

1 month ago
Who are Russian hackers attacking in Ukraine? 01:08

Who are Russian hackers attacking in Ukraine?

Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...

1 month ago
What information are Russian hackers looking for in Ukraine? 01:54

What information are Russian hackers looking for in Ukraine?

Russian hackers are actively attacking Ukrainian organizations, seeking to gain access to internal information, especially...

1 month ago
“My acquaintances almost 'hacked' the Leningrad nuclear power plant.” Andrei Perevezii, independent cyber expert 31:58

“My acquaintances almost 'hacked' the Leningrad nuclear power plant.” Andrei Perevezii, independent cyber expert

Andriy Perevezii, an independent cybersecurity expert and founder of the information security audit company Disl.Tech,...

1 month ago
How hackers started a global cyber war 21:22

How hackers started a global cyber war

North Korean hackers steal billions via SWIFT and crypto. Chinese hackers attack big pharma and...

2 months ago
Hacked a bank = bought a rocket. How DPRK hackers work 24:00

Hacked a bank = bought a rocket. How DPRK hackers work

North Korean hackers have become a state agency, generating revenue for the country, evading sanctions...

2 months ago
Big Laundry. The Art of Money Laundering 07:36

Big Laundry. The Art of Money Laundering

The term “money laundering” has been around for over 80 years, and there are countless...

2 months ago