Filters
Nikita Knysh, HackYourMom: The Participation and Role of Hacktivists in the First World Cyberwar
eQtalk is an original project of the eQtv TV channel. Oleksandr Hlushchenko’s guest is the...
6 days agoQuantum computer will reveal ALL your secrets (one day)
"In the next 10-15 years, we will experience a quantum revolution - no, not like...
1 week agoThe first world cyber war: confession of a Ukrainian hacker
Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...
1 week agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 weeks agoWho are Russian hackers attacking in Ukraine?
Russian hackers are massively attacking Ukrainian organizations, focusing on those of strategic importance - from...
2 weeks agoHow your data is being sold. Protecting yourself from breaches
Your data is being traded on the Internet. Moreover, a criminal can buy not only...
3 weeks agoCryptography. Debunking the myth of omnipotent intelligence services
"There's no point in defending yourself, the FSB has access to everything anyway" - these...
3 weeks agoGetting ready for cybersecurity certification — Lab 27 (Clickjacking): How hackers trick you into clicking links
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
3 weeks agoGetting ready for the cybersecurity certification exam — Lab 3 (API) — Apply a 100% discount on the site
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
4 weeks agoHybrid Warfare 2.0
Drones of unknown origin have started appearing over European cities. Airports are being shut down,...
1 month agoHow Unrestricted AI Helps Criminals
Artificial intelligence has become a convenient tool for hackers and cybercriminals. We’re talking about “smart...
1 month agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 29 (Business Logic Vulnerabilities) — Buy an item at our price
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 28 (XSS) — Find a DOM vulnerability, work with cookies
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGetting ready for the cybersecurity certification exam — Lab 26 (Blind SSRF) — Burp Suite Collaborator, Linux
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
1 month agoGadget for Hacking Any Smartphone. Mobile Forensic Expert and UFED
Russian security forces can hack any phone and gain access to your correspondence using automated...
2 months agoGetting ready for the cybersecurity certification exam — Lab 1 (API) — Delete users without permissions
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 months agoWhy is it important for organizations to establish cooperation with CERT-UA in advance?
How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...
2 months agoHave I been hacked
Digital security course: How to hack someone's account, how to understand whether it's reliably protected...
3 months agoCybersecurity cert prep: Lab 5 (SSRF) — building a custom intruder to scan an internal network
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
3 months ago