Tips for starting a career in cybersecurity. Distilled experiences of my friends and me. Courses, websites, certifications, duration.
Data leak? After a hacker attack, companies usually ensure the public that no personal data has been leaked. But, how do they know it?
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
How to use publicly available information and find a security flaw in the network? OSINT method and Vltava Basin hack case study.
Wondering how to increase RDP (remote desktop) security? Let me tell you how hackers most often hack RDPs and why VPN won't change anything about it.
No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Did you tape your webcam because you're afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I'll tell you about the danger that comes through USB.
I will share with you the USB hacks we and William Ischanoe had taken a bite of at HackerFest, but there was no time to go in depth.
What honeypot can do? And what does an ideal LAN attack detection system look like? Practical insights how honeypot detects unwanted activity in the network.
My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?
Play how to hack computer videos. I have tested hacking gadgets - Bash Bunny and Packet Squirrel. Everyone can hack, you just need to be interested and have free time!
Hak5 Packet Squirrel is another hacking gadget I have tested. What Packet Squirrel can do, where did I buy it and what do I use it for?
Review of Bash Bunny. My exprience with this hacking gadget, examples of BadUSB attacks, where to buy Bash Bunny and my plans for future use.
Broken server, encrypted data and backup as well. How to solve it? Is it worth to pay the ransom and get the data back?