MottikumarMalicious Word Files Used to Disseminate Konni RAT Malware CampaignSecurity researchers have uncovered a new campaign involving the notorious Konni RAT malware, which exploits malicious Word files as its…2 min read·Nov 28, 2023----
Mottikumar3AM: Caffeine, Keyboards, and Questionable Life Choices“Here I am, at the ungodly hour of 3 AM on November 23, my eyes locked in a fierce battle with the glowing abyss of my computer screen. And…3 min read·Nov 22, 2023----
MottikumarWhat is Linux KernelThe Linux kernel is the core component of the Linux operating system (OS) and is responsible for managing the system’s resources and the…2 min read·Nov 22, 2023----
MottikumarWhat is DarkwebThe dark web, often portrayed as a mysterious and nefarious underbelly of the internet, is a topic that has fascinated and concerned many…3 min read·Nov 22, 2023----
MottikumarEthical HackingStarting a journey in ethical hacking can be both exciting and daunting. Ethical hackers, also known as white hat hackers, play a crucial…2 min read·Nov 22, 2023----
MottikumarGetting Started With ReverseReverse engineering is a fascinating and invaluable skill in the world of technology and design. It involves deconstructing a product or…2 min read·Nov 22, 2023----
MottikumarGetting started with Capture The Flag (CTF) competitionsGetting started with Capture The Flag (CTF) competitions can be an exciting and rewarding journey for anyone interested in cybersecurity…3 min read·Nov 22, 2023----
MottikumarGetting Started With Cyber SecurityGetting started with cybersecurity can initially seem daunting, given the vastness and complexity of the field. However, understanding the…3 min read·Nov 22, 2023----
MottikumarSentiment classificationusing Bert ModelBERT, which stands for Bidirectional Encoder Representations from Transformers, is based on Transformers, a deep learning model in which…3 min read·Sep 25, 2021----