MottikumarMalicious Word Files Used to Disseminate Konni RAT Malware CampaignSecurity researchers have uncovered a new campaign involving the notorious Konni RAT malware, which exploits malicious Word files as its…Nov 28, 2023Nov 28, 2023
Mottikumar3AM: Caffeine, Keyboards, and Questionable Life Choices“Here I am, at the ungodly hour of 3 AM on November 23, my eyes locked in a fierce battle with the glowing abyss of my computer screen. And…Nov 22, 2023Nov 22, 2023
MottikumarWhat is Linux KernelThe Linux kernel is the core component of the Linux operating system (OS) and is responsible for managing the system’s resources and the…Nov 22, 2023Nov 22, 2023
MottikumarWhat is DarkwebThe dark web, often portrayed as a mysterious and nefarious underbelly of the internet, is a topic that has fascinated and concerned many…Nov 22, 2023Nov 22, 2023
MottikumarEthical HackingStarting a journey in ethical hacking can be both exciting and daunting. Ethical hackers, also known as white hat hackers, play a crucial…Nov 22, 2023Nov 22, 2023
MottikumarGetting Started With ReverseReverse engineering is a fascinating and invaluable skill in the world of technology and design. It involves deconstructing a product or…Nov 22, 2023Nov 22, 2023
MottikumarGetting started with Capture The Flag (CTF) competitionsGetting started with Capture The Flag (CTF) competitions can be an exciting and rewarding journey for anyone interested in cybersecurity…Nov 22, 2023Nov 22, 2023
MottikumarGetting Started With Cyber SecurityGetting started with cybersecurity can initially seem daunting, given the vastness and complexity of the field. However, understanding the…Nov 22, 2023Nov 22, 2023
MottikumarSentiment classificationusing Bert ModelBERT, which stands for Bidirectional Encoder Representations from Transformers, is based on Transformers, a deep learning model in which…Sep 25, 2021Sep 25, 2021