Filters
Gadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED
Russian security forces can hack any phone and gain access to your correspondence using automated...
1 week agoGetting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 week agoWhy is it important for organizations to establish cooperation with CERT-UA in advance?
How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...
2 weeks agoCybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 4 (SSRF) — Delete a user. Python, Burp Suite
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoWhat you need to know about smartphone security on the go
Discussion of measures of digital security in the context of mobilization in Russia September 21,...
1 month agoWhy do enemy hackers constantly attack Ukrainian media?
Russian hackers regularly attack Ukrainian media outlets not only to disable them, but also to...
1 month agoWhy is Ukraine's experience in countering Russian hackers important for other countries?
Ukraine confronts Russian cyberattacks on a daily basis, gaining unique practical experience. A CERT-UA specialist...
1 month agoCyberspace Defense: How does CERT-UA interact with international organizations?
CERT-UA cooperates with international cyber incident response teams to effectively protect cyberspace. These teams are...
1 month agoHow does CERT-UA respond to cyber incidents?
What does CERT-UA do when an organization suffers from a cyberattack? Deputy Head Evgeniy Bryksin...
1 month agoDo organizations need cybersecurity specialists?
To strengthen cybersecurity, it is important for organizations to engage specialized specialists. Evgeniya Nakonechnaya from...
1 month agoWhat do CERT-UA specialists do?
CERT-UA investigates cyber incidents, prevents attacks, and strengthens the cybersecurity of Ukrainian organizations. Deputy Team...
1 month agoWho are Russian hackers attacking in Ukraine?
Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...
1 month agoWhat information are Russian hackers looking for in Ukraine?
Russian hackers are actively attacking Ukrainian organizations, seeking to gain access to internal information, especially...
1 month ago“My acquaintances almost 'hacked' the Leningrad nuclear power plant.” Andrei Perevezii, independent cyber expert
Andriy Perevezii, an independent cybersecurity expert and founder of the information security audit company Disl.Tech,...
1 month agoHow hackers started a global cyber war
North Korean hackers steal billions via SWIFT and crypto. Chinese hackers attack big pharma and...
2 months agoHacked a bank = bought a rocket. How DPRK hackers work
North Korean hackers have become a state agency, generating revenue for the country, evading sanctions...
2 months agoBig Laundry. The Art of Money Laundering
The term “money laundering” has been around for over 80 years, and there are countless...
2 months ago