IT Security
Tips for starting a career in cybersecurity. Distilled experiences of my friends and me. Courses, websites, certifications, duration.
How Difficult is to Detect a Data Leak
Data leak? After a hacker attack, companies usually ensure the public that no personal data has been leaked. But, how do they know it?
Business E-mail Compromise: Leading Cyberattacks
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
How Could Hackers Attack Vltava Basin? OSINT Research
How to use publicly available information and find a security flaw in the network? OSINT method and Vltava Basin hack case study.
Why Using VPN to Secure RDP Will Not Stop Hackers
Wondering how to increase RDP (remote desktop) security? Let me tell you how hackers most often hack RDPs and why VPN won't change anything about it.
How Hackers Attack Companies Through Their IT Providers
No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Hackers came up with a new trick. They learned to improve their blackmailing with ransomware
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
What hackers can do in your network
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Security insights: Laptop webcam hack
Did you tape your webcam because you're afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
HackerFest 2019 Workshop Sample
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
OSCP: Offensive Security Certified Professional
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Security Insights: How to Get Hacked by a RDP Server
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
Barcamp HK 2018 - Danger in The Name of USB
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I'll tell you about the danger that comes through USB.
HackerFest 2018 and what we couldn´t fit into the lecture
I will share with you the USB hacks we and William Ischanoe had taken a bite of at HackerFest, but there was no time to go in depth.
Honeypot: Efficient and Cheap Way to Detect LAN Attacks
What honeypot can do? And what does an ideal LAN attack detection system look like? Practical insights how honeypot detects unwanted activity in the network.
IT Security: Security Life Cycle
My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?
How to Hack a Computer in Seconds or Bash Bunny and Packet Squirrel Attacks
Play how to hack computer videos. I have tested hacking gadgets - Bash Bunny and Packet Squirrel. Everyone can hack, you just need to be interested and have free time!
Hacking Gadgets: Hak5 Packet Squirrel
Hak5 Packet Squirrel is another hacking gadget I have tested. What Packet Squirrel can do, where did I buy it and what do I use it for?
Hacking Gadgets: Hak5 Bash Bunny
Review of Bash Bunny. My exprience with this hacking gadget, examples of BadUSB attacks, where to buy Bash Bunny and my plans for future use.
Ransomware 2: to Pay the Ransom for Encrypted Data?
Broken server, encrypted data and backup as well. How to solve it? Is it worth to pay the ransom and get the data back?