E W
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(170, 204, 255)","hsl":{"h":216,"s":0.99,"l":0.83}},"f2bba":{"val":"rgba(168, 203, 255, 0.5)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"trewq":{"val":"rgba(168, 203, 255, 0.7)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"poiuy":{"val":"rgba(168, 203, 255, 0.35)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"f83d7":{"val":"rgba(168, 203, 255, 0.4)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"frty6":{"val":"rgba(168, 203, 255, 0.2)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"flktr":{"val":"rgba(168, 203, 255, 0.8)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec encyclopedia
  • Home
  • |
  • Tag: ransomware

Security

Event takeaway: Deutscher IT-Security Kongress

My key takeaways hardening backup systems is key disconnected from the AD designed in ...

Read More

Security

Webinar takeaway – Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse

My key takeaways PC Cyborg AIDS trojan in 1998 => first known ransomware $189 ...

Read More

Security

Webinar takeaway: A Master Class on IT Security – Roger Grimes Teaches Ransomware Mitigation

My key takeaways often ransomeware dwells 8mo-1yr before detection or execution since 1989 AIDS/PC ...

Read More

Security

Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware…

My key takeaways 3 types of ransomware encrypt hard drive steal files and data ...

Read More

Security

Webinar takeaway: How to Cover C&C in the MITRE ATT&CK Matrix

My key takeaways Modern threats are almost impossible to detect by signatures or heuristics ...

Read More

Security

Webinar takeaway: New Wave of Ransomware Attacks: How did this happen?

My key takeaways compliance documents are not written by technical people compliance is not ...

Read More
Load More
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(23, 23, 22)"},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__

Copyright 2023 Jean-Christoph von Oertzen - Privacy policy - Imprint