5W & 1H of Phishing Campaign
A phishing campaign is a kind of scam ran through email and intended to snip personal information from victims. Phishing basically depend on a vulnerability we can never fully abol...Jul. 18
Why we should take care of our network activity by human analyst – From cyber security perspective
After successful intrusion into the network, intruder usually maintain a communication between its network to compromise system, which is commonly known as “backdoor”. Usually intruder put a backdoor shell for maintain remote connection.An analyst can be relaxing by t...May. 14
AI: An opportunity for labor market or a curse?
Recently, many reports and analyses have been created that try to predict how dynamically the labor market will evolve in response to the development of artificial intelligence. Wo...Mar. 20