cyber security
-
VMware

WinRAR Exploited To Encrypt Windows & Linux – New Ransomware Strategy?!
Researchers have uncovered a critical vulnerability in the widely used WinRAR tool that hackers are exploiting to deploy ransomware across both Windows and Linux systems. In this video, we dive into how hacktivist group Head Mare is using this flaw, known as CVE-2023-38831, to encrypt data, targeting industries in Russia and Belarus with sophisticated ransomware like LockBit and Babuk. We’ll…
Read More » -
Linux

Install any app in SECONDS! (Windows, OSX, Linux)
I get my music from Artlist – GET 2 MONTHS FREE when you use my link – The FASTEST way to install applications and packages on Windows, Mac OSX and Linux! Chocolatey – The Largest Repository of Windows Packages Homebrew – The Missing Package Manager for macOS (or Linux) CAUTION: Your use of the packages on Chocolatey and Homebrew means…
Read More » -
workstation

دبلومة الامن السيبرانى || session 1 cyber security introduction
دبلومة الامن السيبرانى || session 1 cyber security introduction فى هذه الدبلومة سنقوم بدراسة مجال penetration testing وحانتعرف عن المجال كامل الى ان نصل للقيام بعمليات اختراق حقيقية واكتشاف ثغرات الدبلومة لا تحتاج لخبرة مسبقة لانها تبداء من الصفر #cyber security #networking #penetration testing [ad_2] source
Read More » -
VMware

2+ HOURS OF INTERNET CRIME | Dangerous Criminal Hacker Stories
Compilation of 7 original true cyber crime, internet hacking and sanctioned organisation documentaries, explained easily. This is recent cyber security news, and their history, turned into stories. It includes tales about elite hackers, AKA ‘advanced persistent threats’, computer virus and malware tools, and how they wreak havoc across companies worldwide. Enjoy this for easy listening before sleeping or as background…
Read More » -
Virtualization

What Are The Different Layers Of Cloud Computing Architecture? – BusinessGuide360.com
What Are The Different Layers Of Cloud Computing Architecture? In this insightful video, we delve into the intricate layers of cloud computing architecture. Discover the foundational elements that power this revolutionary technology, from the physical infrastructure to the user-centric applications. Gain a comprehensive understanding of the virtualization, control, and orchestration layers that orchestrate seamless operations in cloud computing. Explore how…
Read More » -
workstation

Cyber Security tutorials || Demo – 4 || by Mr. Shoaib Ahmed On 26-09-2024 @9:15PM IST
Cyber Security tutorials || Demo – 4 || by Mr. Shoaib Ahmed On 26-09-2024 @9:15PM IST Course Content: ====================================================================== To get latest DURGASOFT updates on trending Technologies, Please Subscribe to Our Telegram Channel: LINK: ==================================================== You an see more Java videos following link: Java tutorial by durga sir Java 9 by durga sir Java 1.8 Version New Features by Durga…
Read More »





