Web Penetration Testing - Malware
![Hacking WordPress: Vulnerabilities and Countermeasures](https://images.ctfassets.net/1kaqtc248p95/2egzevezccu2luSCx0fC3/b6acbb414a749d9d1ba564179c6340cc/wordpress-hacking.png)
Hacking WordPress: Vulnerabilities and Countermeasures
July 13, 2023
![Ransomware Detection Techniques Using Machine Learning](https://images.ctfassets.net/1kaqtc248p95/7lOUWCVyy6HtfwmDj20q8d/b8f0074800b7ffd0856c1514ca9f557a/ransom_ml.png)
Ransomware Detection Techniques Using Machine Learning
May 12, 2023
![Assessing the Security of Cloud Environments](https://images.ctfassets.net/1kaqtc248p95/3lNCp79Xm4ByDluB9FdUnW/3b0baf59f44194ea2ad3bfb1ebdb90e0/assess.png)
Assessing the Security of Cloud Environments
May 13, 2023
![Understanding Malware Behaviour through Reverse Engineering](https://images.ctfassets.net/1kaqtc248p95/4wye8UuM7Zbr4e5RcOWCRG/ddf0b9588fb2dbd2ce1dc53160860fbb/mal_rev.png)
Understanding Malware Behaviour through Reverse Engineering
May 15, 2023
![Understanding Ransomware through Reverse Engineering](https://images.ctfassets.net/1kaqtc248p95/1qA8yGnogz301ze1kEGRnF/32b2798389a788431d20f25a8a2c7162/ransomware_rev.png)
Understanding Ransomware through Reverse Engineering
May 11, 2023
![The Future of Ransomware](https://images.ctfassets.net/1kaqtc248p95/Cwkv18oFUfPTS5JIKv0nd/10a38603849116832668ef55a996a1dd/ransomware.png)
The Future of Ransomware
May 11, 2023
![The Latest Ransomware Attacks and How to Avoid Them](https://images.ctfassets.net/1kaqtc248p95/xCRQvOiLKxBffx5PYR8c9/bf27564a9e0b43f4af3200b549b24029/ransomware.png)
The Latest Ransomware Attacks and How to Avoid Them
June 10, 2023