Dhruv RajpurohitforCyber Securitycybersecurity2712.hashnode.dev·Dec 3, 2023Demystifying Ransomware: Understanding, Detecting, and Preventing the ThreatIntroduction In the ever-evolving landscape of cybersecurity, ransomware has emerged as one of the most formidable threats. This malicious software encrypts a user's files or system, rendering them inaccessible until a ransom is paid. Understanding h...Discusscybersecurity
Bishwajeet Biswasblog.ethernyte.com·Dec 1, 2023Unraveling the Intricacies of C# DLL Injection Malware: A Deep Dive into Malicious CodeIn the world of cybersecurity, every day is a battle against an evolving army of digital adversaries. Today, we're going to explore the thrilling, mysterious realm of C# DLL Malware. This journey will involve analyzing file hashes, decoding the secre...Discuss#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 24, 2023Excel Macros Unleashed: The Hidden Malware ThreatIn the realm of cybersecurity, the unassuming Excel spreadsheet has become a battleground for cybercriminals. Excel macro malware, the silent saboteurs, lurk within seemingly harmless files, waiting to strike. Let's embark on a quest to decode their ...Discuss#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 3, 2023A Journey through the Shadows: Unmasking Process Injector Malware"In a digital world teeming with threats, process injector malware is the silent infiltrator that lurks in the background, evading detection. Our mission: decode this digital enigma. Our tools: file hashes, VirusTotal (VT) analysis, and a healthy dose...Discuss#cybersecurity
Ethan Mitchellcybershield.hashnode.dev·Oct 9, 2023Deep Dive: The Evolution of Ransomware and How To Protect YourselfRansomware, a malicious software that encrypts your files and demands a ransom for their release, has become a pervasive and evolving threat in the digital landscape. Over the years, it has transformed and adapted, leaving individuals and organizatio...Discussransomware
The CyberShield Chroniclescyberinsights.hashnode.dev·Sep 21, 2023Threat Actor "Seize" Offering Ergon Ransomware-as-a-Service on BreachForums 2Executive Summary On September 22, 2023, an underground forum member using the pseudonym "seize" unveiled Ergon, a cutting-edge Ransomware-as-a-Service (Raas) on BreachForums 2. Ergon, as described by seize, boasts full undetectability (FUD), effortl...Discussransomware
Derek Onwudiwetecheffect.hashnode.dev·Sep 7, 2023Traffic Light HackingWe frequently see movie scenarios when hackers are able to breach systems for the management of traffic lights, with devastating repercussions. This is a tested security research. Introduction Traffic lights are a critical component of urban infrastr...Discusstraffic
Nguyễn Đăng HưngforBlueCyber's blogbluecyber.hashnode.dev·Jun 17, 2023In-Depth Analysis Of An Old Famous Ransomware - Wannacry - PART.1I - Prologue It has been nearly 6 years since the infamous ransomware crisis known as 'Wannacry' affected most countries around the world. However, to this day, this malware is still frequently mentioned in discussions within the field of information...Discuss·10 likes·100 readsMalware
Derek Onwudiwetecheffect.hashnode.dev·Jun 14, 2023Nkechi's Cybersecurity NightmareIn the digital city of 042, there lived a young woman named Nkechi. She was a vibrant and tech-savvy individual who loved to share her life and connect with friends on various social media platforms. Nkechi had built a virtual network of friends, spa...Discussransomware
Srujan Landerisrujanlanderi.hashnode.dev·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·66 readscybersecurity