From 4535c26a5c687604dfef0464e0df05bdf3f1f08e Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:13:42 +0200 Subject: [PATCH] Agent: Change Guardicore link in ransowmare readme --- .../infection_monkey/payload/ransomware/ransomware_readme.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt b/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt index e3131c465..be4386c56 100644 --- a/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt +++ b/monkey/infection_monkey/payload/ransomware/ransomware_readme.txt @@ -44,7 +44,7 @@ Infection Monkey is an open-source breach and attack simulation (BAS) platform. directory have been manipulated as part of a ransomware simulation. If you've discovered this file and are unsure about how to proceed, please contact your administrator. -For more information about Infection Monkey, see https://www.guardicore.com/infectionmonkey. +For more information about Infection Monkey, see https://www.akamai.com/infectionmonkey. For more information about Infection Monkey's ransomware simulation, see https://www.guardicore.com/infectionmonkey/docs/reference/ransomware.