• Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse
Cybersecurity Is Sexy!

Bringing cybersecurity awareness to the masses!! DO YOUR PART. #BECYBERSMART

  • Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse
  • Home
  • About
  • Definitions/Glossary
  • Social
    • Twitter
    • Instagram
    • Clubhouse

No Widgets found in the Sidebar Alt!

  • Cybersecurity,  Malware,  Ransomware,  Security

    Virtual Machines VM’s Are Being Used to Hide Ransomware Activity

    June 29, 2021 /

    As society continues to embrace all things cloud and move more toward virtualization, this field becomes a ripe target for malicious actors (bad people). We are now seeing the use of VMs to implement and hide malicious activity including ransomware. The tactic involves hiding the ransomware payload in a virtual machine on infected hosts. The use of a VM is to provide stealth and help avoid detection for as long as possible. Hosting encryption software within a self-started VM means that typical anti-virus software will not detect it! And when the VM is closed down, it removes a significant amount of possible forensic evidence with it! That’s not good. Some…

    read more
    Admin 0 Comments

    You May Also Like

    Post-Quantum Cryptography: The Race Is On

    June 18, 2021

    What is a Ragnar Locker Ransomware Attack?

    June 29, 2021

    The Importance of Configuration

    June 19, 2021
  • Cybersecurity,  Malware,  Ransomware,  Security,  Tech

    What is a Ragnar Locker Ransomware Attack?

    June 29, 2021 /

    Ragnar Locker is ransomware that affect devices running Microsoft Windows operating systems. The Ragnar Locker method was first observed in December 2019 as part of a series of attacks against compromised networks. Biblio: Ragnar locker malware: what it is, how it works and how to prevent it–Infosec Institute

    read more
    Admin 0 Comments

    You May Also Like

    Integrating Security Into Networking From The Ground Up…

    June 18, 2021

    Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.

    June 18, 2021

    What is a “False Positive”?

    June 14, 2021
  • Home
  • About
  • Definitions/Glossary
  • Social
Ashe Theme by WP Royal.