Akira ransomware: The latest threat to your data security

Поділитися
Вставка
  • Опубліковано 9 січ 2025

КОМЕНТАРІ • 9

  • @faizankhanseo4639
    @faizankhanseo4639 Рік тому +2

    Sir how to connect your device for forensics to an environment that is under ransomware attack?

  • @rahulove30
    @rahulove30 Рік тому

    Good evening prabh sir ji
    Can explain with one of these on practical.
    This will help us lot.

  • @vishukumar299
    @vishukumar299 Рік тому

    Hello sir,
    Once affected by Akira ransomware, what to do?

  • @jytan740
    @jytan740 Рік тому

    could firewall/antivirus/EDR prevent the execution of all malware?

    • @ivanvincentborgonos3058
      @ivanvincentborgonos3058 9 місяців тому

      EDR can block the file that executes that malware. You have to define it on your EDR such as the hash value of the file.

  • @sachin-tr4nc
    @sachin-tr4nc Рік тому

    Hi Prabh sir,
    You can refer below point during interview for Specialist/Lead Security Analyst (L2 or L3 )
    Make please video on It(Subject "Lead security analyst interview preparation"),
    1- sir Ask some Real Time Use cases to explain End to End in project done
    2- What where the Issues Faced & how come he eradicate those in project
    3-How do you create usecase & how to write correlation Rules in SIEM Tool.
    4- what are difficulties during implementing the SIEM tool & Executing use Case in them
    5- Being Lead how does he handle the team & Assign the work to Teammates
    6- one Big challenge faced being Lead & how Resolved it(In Threat Hunting & in incident response process)
    7- what where the Problems Faced while Threat Hunting & Incident Response in Project, How do you overcome those
    8-Being Lead How does "Threat Model Framework does he choose & what are the parameters"
    9-What where the Issues Faced during MITER ATTACK implementation In project & Being Lead how he implemented changes to get excuted in process
    10- Being Lead what are Advantages of AI in cyber security & how to make sure use of it in day to day work process
    11- How AI is Dangerous to cyber security & what are the Replication during In work Environment
    Some more sample Questions you can add from your End during Interviewing the process .

    • @PrabhNair1
      @PrabhNair1  Рік тому +2

      Ok bro I am in process of making give us some time

    • @sachin-tr4nc
      @sachin-tr4nc Рік тому

      @@PrabhNair1 ok Sir thanks for Replying & confirm it, We All students will wait above mentioned Request, Thanks in Advance & Have a Great year ahead 😊