PinnedMEHERAuthentication!This is a concept of verification, i.e., verifying the user's identity. Authentication is secured by adding multiple factors, which is…Aug 2Aug 2
PinnedMEHERSTATIC MALWARE ANALYSIS OF ZEUS BANKING TROJAN REPORTMy inspiration, #Grant Collins, has always supported my cybersecurity journey. Learning from his videos, I have tried analyzing malware at…May 27May 27
MEHERlevel of SEVERITYThis is a basic keylogger script, a resource for learning: <Z_Security, mentor: Zaid, Udemy course: Learn Python and Ethical Hacking from…Sep 4Sep 4
MEHERLA COUNTY HEALTH SERVICES: PATIENT’S DATA EXPOSED IN PHISHING ATTACK“This is a small case study for my academic project. A few hypothetical assumptions in this case-study comments are accepted on hypothesis…May 25May 25
MEHERNOT-EE-PAD (A good example of TYPO-SQUATTING. )I started learning Wireshark and practicing with malware packet files for enumeration. It’s been quite fun diving into this world! I…Apr 41Apr 41