Why is Google moving from an open platform to a controlled ecosystem ?
Cybersecurity Learning
Why is Google moving from an open platform to a controlled ecosystem ?
9:23
Palantir: The Most Powerful Surveillance System Ever Built
Cybersecurity Learning
Palantir: The Most Powerful Surveillance System Ever Built
11:33
Pegasus vs iOS : The Part Apple Can't Secure !
Cybersecurity Learning
Pegasus vs iOS : The Part Apple Can't Secure !
10:03
You're Still Traceable on GrapheneOS (And Here's Why)
Cybersecurity Learning
You're Still Traceable on GrapheneOS (And Here's Why)
7:29
GrapheneOS Under Attack? Here's What Actually Happened
Cybersecurity Learning
GrapheneOS Under Attack? Here's What Actually Happened
9:12
The Truth About VPN Providers | What They Won't Tell You
Cybersecurity Learning
The Truth About VPN Providers | What They Won't Tell You
9:23
Metadata: The Invisible Threat Beyond Encryption
Cybersecurity Learning
Metadata: The Invisible Threat Beyond Encryption
9:09
Your Phone is Never Truly Off (The Architecture of Tracking)
Cybersecurity Learning
Your Phone is Never Truly Off (The Architecture of Tracking)
8:19
The Ghost Phone: How to Stop 5G and SIM Card Tracking
Cybersecurity Learning
The Ghost Phone: How to Stop 5G and SIM Card Tracking
11:29
This Android Feature Is Tracking You Without Permission
Cybersecurity Learning
This Android Feature Is Tracking You Without Permission
8:34
Can Pegasus REALLY Hack GrapheneOS ?
Cybersecurity Learning
Can Pegasus REALLY Hack GrapheneOS ?
9:48
Make Your Phone Nearly Unhackable
Cybersecurity Learning
Make Your Phone Nearly Unhackable
9:05
The Real Reason 5G Isn't Secure Yet
Cybersecurity Learning
The Real Reason 5G Isn't Secure Yet
11:26
6G Will Turn the Network Into a Sensor
Cybersecurity Learning
6G Will Turn the Network Into a Sensor
10:49
5G Can Track You Without Your Phone
Cybersecurity Learning
5G Can Track You Without Your Phone
11:19
5G Isn't Secure — Here's the Paradox
Cybersecurity Learning
5G Isn't Secure — Here's the Paradox
11:26
The Hidden OS Inside Your Phone (It’s Not Android)
Cybersecurity Learning
The Hidden OS Inside Your Phone (It’s Not Android)
8:10
Why eSIMs Are More Vulnerable Than You Think
Cybersecurity Learning
Why eSIMs Are More Vulnerable Than You Think
10:00
Landfall Spyware : A Single Image Can Hack You !
Cybersecurity Learning
Landfall Spyware : A Single Image Can Hack You !
10:02
The Hidden Application Inside Your SIM Card
Cybersecurity Learning
The Hidden Application Inside Your SIM Card
10:49
Silent SMS: The Spy Technique Your Phone Can’t Detect
Cybersecurity Learning
Silent SMS: The Spy Technique Your Phone Can’t Detect
8:07
The SIM Card Hack You’re Not Supposed to Know About
Cybersecurity Learning
The SIM Card Hack You’re Not Supposed to Know About
8:30
Worse than Pegasus? The Secret Spy Tool Tracking You
Cybersecurity Learning
Worse than Pegasus? The Secret Spy Tool Tracking You
9:14
Is Your Phone Really Spying On You?
Cybersecurity Learning
Is Your Phone Really Spying On You?
8:08
Android Sensor Espionage: Microphone and Camera Hijacking
Cybersecurity Learning
Android Sensor Espionage: Microphone and Camera Hijacking
7:33
How Mobile Baseband Processors Can Be Exploited (and Mitigated)
Cybersecurity Learning
How Mobile Baseband Processors Can Be Exploited (and Mitigated)
8:13
From SS7 to Diameter: how 4G and 5G networks still leak your data
Cybersecurity Learning
From SS7 to Diameter: how 4G and 5G networks still leak your data
9:35
Your Phone Has a Secret Computer Inside!
Cybersecurity Learning
Your Phone Has a Secret Computer Inside!
8:01
How fake cell towers (IMSI-catchers) steal your data — detection & protection
Cybersecurity Learning
How fake cell towers (IMSI-catchers) steal your data — detection & protection
9:11
How to Kick Hackers Off Your Phone Fast
Cybersecurity Learning
How to Kick Hackers Off Your Phone Fast
8:01
The Hidden World of eSIM
Cybersecurity Learning
The Hidden World of eSIM
9:00
Is Your Phone Infected by Pegasus ?
Cybersecurity Learning
Is Your Phone Infected by Pegasus ?
9:00
Does Airplane Mode Really Hide You?
Cybersecurity Learning
Does Airplane Mode Really Hide You?
5:59
How the NSA hacks Turned-Off Phones
Cybersecurity Learning
How the NSA hacks Turned-Off Phones
8:01
Pegasus Spyware: How iPhones Get Hacked Without You Clicking Anything
Cybersecurity Learning
Pegasus Spyware: How iPhones Get Hacked Without You Clicking Anything
7:33
How Hackers Track Your Phone Using IMSI Catchers
Cybersecurity Learning
How Hackers Track Your Phone Using IMSI Catchers
8:28
How Hackers can track your phone even when it's powered off
Cybersecurity Learning
How Hackers can track your phone even when it's powered off
8:48
SIM SWAP : How Hackers Steal Your Number
Cybersecurity Learning
SIM SWAP : How Hackers Steal Your Number
8:41
5 Easy Ways to Protect Your Phone Now
Cybersecurity Learning
5 Easy Ways to Protect Your Phone Now
7:59
Warning Signs Your Phone Is Being Watched (Old Version)
Cybersecurity Learning
Warning Signs Your Phone Is Being Watched (Old Version)
10:05
The Secret Flaw In Every Mobile Network
Cybersecurity Learning
The Secret Flaw In Every Mobile Network
8:20
10 Free OSINT Tools to Easily Explore the Dark Web
Cybersecurity Learning
10 Free OSINT Tools to Easily Explore the Dark Web
10:37
Find Anyone On Internet with OSINT
Cybersecurity Learning
Find Anyone On Internet with OSINT
8:55
SpiderFoot: The Free OSINT Tool to Automate Your Investigations
Cybersecurity Learning
SpiderFoot: The Free OSINT Tool to Automate Your Investigations
7:14
Can Someone Find Your Secrets With Just Your Phone Number?
Cybersecurity Learning
Can Someone Find Your Secrets With Just Your Phone Number?
7:37
WhatsApp Tracking and Advanced OSINT
Cybersecurity Learning
WhatsApp Tracking and Advanced OSINT
6:46
Your Phone Isn't Secure: The SS7 Network Hack Revealed
Cybersecurity Learning
Your Phone Isn't Secure: The SS7 Network Hack Revealed
8:22
Discover the SECRET of your phone number with PhoneInfoga!
Cybersecurity Learning
Discover the SECRET of your phone number with PhoneInfoga!
7:53
OSINT: What Your Phone Number Reveals About You (10 Free Tools)
Cybersecurity Learning
OSINT: What Your Phone Number Reveals About You (10 Free Tools)
7:01
80% of people have a trace on the Internet without knowing it!
Cybersecurity Learning
80% of people have a trace on the Internet without knowing it!
6:37
ISO 27001 explained simply: PDCA, risk management and certification
Cybersecurity Learning
ISO 27001 explained simply: PDCA, risk management and certification
10:28
How Hackers Steal Your Information Without Touching Your Phone
Cybersecurity Learning
How Hackers Steal Your Information Without Touching Your Phone
9:31
11 OSINT Tools: Track Planes, Crowds & Evidence in Real Time
Cybersecurity Learning
11 OSINT Tools: Track Planes, Crowds & Evidence in Real Time
9:42
SpiderFoot: The OSINT tool that automates your online investigations
Cybersecurity Learning
SpiderFoot: The OSINT tool that automates your online investigations
7:45
OSINT in 2025: What You Need to Know to Stay Within the Law
Cybersecurity Learning
OSINT in 2025: What You Need to Know to Stay Within the Law
6:35
10 Free OSINT Tools to Easily Explore the Dark Web
Cybersecurity Learning
10 Free OSINT Tools to Easily Explore the Dark Web
13:32
10 OSINT tools to learn everything about YOU!
Cybersecurity Learning
10 OSINT tools to learn everything about YOU!
14:27
10 OSINT tools to learn everything about YOU!
Cybersecurity Learning
10 OSINT tools to learn everything about YOU!
14:27
Strong Authentication: Why You Need to Switch to MFA Now
Cybersecurity Learning
Strong Authentication: Why You Need to Switch to MFA Now
21:18
What if protective AI becomes our last hope?
Cybersecurity Learning
What if protective AI becomes our last hope?
5:45
Comment le SOC vous protège des cyberattaques !
Cybersecurity Learning
Comment le SOC vous protège des cyberattaques !
10:53
SOC : l’arme secrète des entreprises contre les cyberattaques
Cybersecurity Learning
SOC : l’arme secrète des entreprises contre les cyberattaques
9:17
Les cyberattaques trompent même l’IA (voici comment les éviter)
Cybersecurity Learning
Les cyberattaques trompent même l’IA (voici comment les éviter)
6:57
EDR ou Antivirus : qui protège vraiment ton PC ?
Cybersecurity Learning
EDR ou Antivirus : qui protège vraiment ton PC ?
14:29
C’est quoi le Zéro Trust en cybersécurité ?
Cybersecurity Learning
C’est quoi le Zéro Trust en cybersécurité ?
14:05
Télétravail : les conseils ANSSI que vous ignorez (et qui vous protègent)
Cybersecurity Learning
Télétravail : les conseils ANSSI que vous ignorez (et qui vous protègent)
16:58
IA vs Hackers : les experts sous le choc avec XBOW
Cybersecurity Learning
IA vs Hackers : les experts sous le choc avec XBOW
6:11
Victime d’un ransomware ? 10 actions pour limiter les dégâts
Cybersecurity Learning
Victime d’un ransomware ? 10 actions pour limiter les dégâts
11:21
A quoi sert un CASB (Cloud Access Security Broker) ?
Cybersecurity Learning
A quoi sert un CASB (Cloud Access Security Broker) ?
2:41
L’IA Va-t-Elle Sauver ou Détruire la Cybersécurité ?
Cybersecurity Learning
L’IA Va-t-Elle Sauver ou Détruire la Cybersécurité ?
8:57
Why your cloud is not protected (even with antivirus software)
Cybersecurity Learning
Why your cloud is not protected (even with antivirus software)
8:45
SecNumCloud: the trusted Cloud
Cybersecurity Learning
SecNumCloud: the trusted Cloud
6:46
ISO27001, 27002 and 27005, the golden triangle for a perfect ISMS!
Cybersecurity Learning
ISO27001, 27002 and 27005, the golden triangle for a perfect ISMS!
13:20
Kill Chain: Analyze Attacks to Better Defend Yourself!
Cybersecurity Learning
Kill Chain: Analyze Attacks to Better Defend Yourself!
15:40
PASSI : Maîtrisez l’Audit Cyber !
Cybersecurity Learning
PASSI : Maîtrisez l’Audit Cyber !
20:26
NIS2: Europe strengthens its cyber defense #cybersecurity #nis2
Cybersecurity Learning
NIS2: Europe strengthens its cyber defense #cybersecurity #nis2
11:31
Protection numérique : l’arme secrète contre le piratage
Cybersecurity Learning
Protection numérique : l’arme secrète contre le piratage
16:07
ANSSI: 42 simple rules to secure your systems
Cybersecurity Learning
ANSSI: 42 simple rules to secure your systems
18:33
FREE PIRATÉ : Vos IBAN en Danger ? Découvrez Toute la Vérité !
Cybersecurity Learning
FREE PIRATÉ : Vos IBAN en Danger ? Découvrez Toute la Vérité !
9:08
Découvrez les secrets d'une attaque informatique expliqués simplement
Cybersecurity Learning
Découvrez les secrets d'une attaque informatique expliqués simplement
10:31
MITRE ATT&CK : découvrez les techniques secrètes des hackers en 5 min
Cybersecurity Learning
MITRE ATT&CK : découvrez les techniques secrètes des hackers en 5 min
3:23
La vérité sur la certification CPTS expliquée simplement !
Cybersecurity Learning
La vérité sur la certification CPTS expliquée simplement !
13:23