Jenny Anderson
4 Posts
I am a cybersecurity enthusiast and an author. I write technical blogs and articles related to cyber security.
IntroductionThe term "Trojan" is typically derived from the ancient Greek story of Troy. Trojans work similarly to the wooden horse in the story, introducing something unexpected under a disguise. Trojans are malware disguising themselves as legitimate file to trick the victims into clicking, downloading, or installing the malicious software onto
What is Malware?Malware, or malicious software, refers to any program or code that infects a computer and causes damage to it. Malware is malicious software that targets and seeks to damage, disable, or destroy computers, computer networks, tablets, and mobile devices, often by taking control of a device's operations.
What is Botnet?The bot is a piece of malware that executes commands under the control of a remote attacker by infecting a computer system. The botnet is a network of malware-infected computers controlled by the bot herder. A botherder manages the botnet infrastructure and uses compromised computers to crack
What is Lateral Movement?According to Mitre Att&ck, "Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their