80 videos

Filters

0:00 04:17:55
Clear
Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar 01:54:53

Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar

eQtalk is an original project of the eQtv TV channel. Oleksandr Hlushchenko’s guest is the...

6 days ago
Quantum computer will reveal ALL your secrets (one day) 11:50

Quantum computer will reveal ALL your secrets (one day)

"In the next 10-15 years, we will experience a quantum revolution - no, not like...

1 week ago
The first world cyber war: confession of a Ukrainian hacker 02:32:43

The first world cyber war: confession of a Ukrainian hacker

Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...

1 week ago
Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation 24:31

Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 weeks ago
Who are Russian hackers attacking in Ukraine? 01:08

Who are Russian hackers attacking in Ukraine?

Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...

2 weeks ago
How your data is being sold. Protecting yourself from breaches 11:52

How your data is being sold. Protecting yourself from breaches

Your data is being traded on the Internet. Moreover, a criminal can buy not only...

3 weeks ago
Cryptography. Debunking the myth of omnipotent intelligence services 12:10

Cryptography. Debunking the myth of omnipotent intelligence services

"There's no point in defending yourself, the FSB has access to everything anyway" - these...

3 weeks ago
Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links 11:08

Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

3 weeks ago
Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site 17:46

Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

4 weeks ago
Hybrid Warfare 2.0 16:57

Hybrid Warfare 2.0

Drones of unknown origin have started appearing over European cities. Airports are being shut down,...

1 month ago
How Unrestricted AI Helps Criminals 18:27

How Unrestricted AI Helps Criminals

Artificial intelligence has become a convenient tool for hackers and cybercriminals. We’re talking about “smart...

1 month ago
Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation 09:15

Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price 04:33

Getting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 28 (XSS) — Find a DOM vulnerability, work with cookies 10:42

Getting ready for the cybersecurity certification exam — Lab 28 (XSS) — Find a DOM vulnerability, work with cookies

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Getting ready for the cybersecurity certification exam — Lab 26 (Blind SSRF) — Burp Suite Collaborator, Linux 10:42

Getting ready for the cybersecurity certification exam — Lab 26 (Blind SSRF) — Burp Suite Collaborator, Linux

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

1 month ago
Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED 54:36

Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED

Russian security forces can hack any phone and gain access to your correspondence using automated...

2 months ago
Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions 14:28

Getting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Why is it important for organizations to establish cooperation with CERT-UA in advance? 01:00

Why is it important for organizations to establish cooperation with CERT-UA in advance?

How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...

2 months ago
Have I been hacked 01:32

Have I been hacked

Digital security course: How to hack someone's account, how to understand whether it's reliably protected...

3 months ago
Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network 10:08

Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network

"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

3 months ago