Skip to content

Advanced Ransomware Attacks

In most cases, the vector of infection is either a malicious email that contains a malicious attachment or link, or an attack via an inadequately secured Remote Desktop Protocol. Nonetheless, cybercriminals can also exploit new vulnerabilities to gain unauthorised access to target networks.
More – who are they? is documentary film that depicts one aspect of the hacking scene in Slovenia and its evolution in the last 20 years. Who are hackers and what drives them? The …