Aug. 24, 2023, 6:05 p.m. | Devon Griffith

System Weakness - Medium systemweakness.com

This is the second blog post in a 3-part series about Ransomware. The first post covered a very general explanation of what Ransomware is, what it does, some ways it is used, and a few tips on what to do if you are unlucky enough to fall victim to it. There was no code provided in the first post, but Part 2 will cover the first half of the “implementation”, if that’s what you want to call it, with some …

blog blog post code cybersecurity general it security malware malware analysis no code ransomware series tips victim

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden