Security and Privacy Academy
Videos about security and privacy: Current events, theory, and history.
Contact: [email protected]
Почему мы не увидим вредоносное ПО на основе ИИ в ближайшее время
Законы о проверке личности имеют обратный эффект
Неисправленная уязвимость нулевого дня Microsoft
Критическая уязвимость WordPress активно эксплуатируется
Скрытый риск Microsoft 365
SIM Swapping: How Hackers Steal Your Phone Number and How to Stop Them
17 Steps to Cybersecurity. Part 3: Steps 16 and 17 (Increased Protection Needs)
17 Steps to Cybersecurity. Part 2: Steps 10 to 15 (Standard Protection)
17 Steps to Cybersecurity. Part 1: Steps 1 to 9 (Basic Protection)
Firefox Extensions that Steal your Crypto
US Congress Bans Whats App
Notepad++ Vulnerability Lets Attacker Gain Complete System Control
TP-Link Router Vulnerability CVE-2023-33538
Implementing a Zero Trust Architecture
KaliGPT: Revolutionizing Cybersecurity
Voice Phishing (Vishing) and Data Extortion
What Are Passkeys?
How Kraken Outsmarted a North Korean Hacker Trying to Infiltrate Their Company
The EU Digital Identity Wallet: Revolution or Risk?
AWS S3 Ransomware Crisis: 1,200 Stolen Keys Exploited
Florida’s Encryption Backdoor Law: Dangerous & Dumb
Seven Risks of Central Bank Digital Currency (CBDC)
Central Bank Digital Currency (CBDC) - Privacy, Power, and the Future
The PowerSchool Data Breach
Oracle Cloud Hacked?
The Hidden Risks of Generative AI in Enterprises
Apple Halts Advanced Data Protection in the UK
Understanding CVE-2025-21418: Windows Ancillary Function Driver Vulnerability
Understanding and Combating Ransomware
New U.S. Privacy Laws in 2025