82 videos

Filters

0:00 04:17:55
Clear
Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar 01:54:53

Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar

eQtalk is an original project of the eQtv TV channel. Oleksandr Glushchenko’s guest is the...

3 weeks ago
What you need to know about smartphone security on the go 34:28

What you need to know about smartphone security on the go

Discussion of measures of digital security in the context of mobilization in Russia September 21,...

4 weeks ago
Everything You Need to Know About Google Advanced Search 07:29

Everything You Need to Know About Google Advanced Search

In this video, we'll cover everything you need to know about Google's advanced search, including...

4 weeks ago
How do you know if your phone has been hacked? 14:58

How do you know if your phone has been hacked?

Most of you store your most valuable data on your phone: correspondence, routes, payment information,...

4 weeks ago
The Quietest Cyber Catastrophe of 2025 16:04

The Quietest Cyber Catastrophe of 2025

You might think you use only safe, licensed software and know exactly where it comes...

1 month ago
The first world cyber war: confession of a Ukrainian hacker 02:32:43

The first world cyber war: confession of a Ukrainian hacker

Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...

2 months ago
Pavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals 01:14:01

Pavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals

eQtalk is an original project by the eQtv channel. The guest of the episode is...

2 months ago
Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network 10:08

Cybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links 11:08

Getting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Getting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0 19:51

Getting ready for the cybersecurity certification exam — Lab 2 (API) — Buy an item for $0

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Quantum computer will reveal ALL your secrets (one day) 11:50

Quantum computer will reveal ALL your secrets (one day)

In the next 10-15 years, we will experience a quantum revolution - no, not like...

2 months ago
Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation 24:31

Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Who are Russian hackers attacking in Ukraine? 01:08

Who are Russian hackers attacking in Ukraine?

Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...

2 months ago
How your data is being sold. Protecting yourself from breaches 11:52

How your data is being sold. Protecting yourself from breaches

Your data is being traded on the Internet. Moreover, a criminal can buy not only...

2 months ago
Cryptography. Debunking the myth of omnipotent intelligence services 12:10

Cryptography. Debunking the myth of omnipotent intelligence services

"There's no point in defending yourself, the FSB has access to everything anyway" - these...

2 months ago
Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site 17:46

Getting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

2 months ago
Hybrid Warfare 2.0 16:57

Hybrid Warfare 2.0

Drones of unknown origin have started appearing over European cities. Airports are being shut down,...

3 months ago
How Unrestricted AI Helps Criminals 18:27

How Unrestricted AI Helps Criminals

Artificial intelligence has become a convenient tool for hackers and cybercriminals. We’re talking about “smart...

3 months ago
Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation 09:15

Cybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

3 months ago
Getting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price 04:33

Getting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price

Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...

3 months ago