6.2 C
New York

Author: Sk8Fl0 The Engineer

I am an aspiring Information Security professional.
Brief definition of Ransomware Ransomware Attacks are basically a headline in the news or social media feed. Ransomware is a program that restricts access to files (usually by encrypting them) until the victim pays the attacker. Access...
Two exploits were recently used to compromise Microsoft Exchange Servers, ProxyNotShell is the name for the combination. The first vulnerability is a Server-Side Request Forgery (SSRF) known as CVE 2022-41040. The SSRF Attack occurs when an...

North Korean Hackers (UNC4034) Use Putty Software as Trojan

What is Putty? Putty is a software available for Windows users to initiate SSH and Telnet connections. The software is open source which means...

Hacks 2022: Zero Day Vulnerabilities

Zero Day vulnerabilities have a special place in the modern era. The Internet of Things (IoT) is our interconnectivity between devices that can be...

Recent articles