forked from p34709852/monkey
Give more context. Explain how a ransomware attack usually does this. Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com> |
||
---|---|---|
.. | ||
exploiters | ||
scanners | ||
_index.md | ||
data_directory.md | ||
mitre_techniques.md | ||
operating_systems_support.md | ||
ransomware.md |