Skip to the content.

Cyber Security | Rohan Bojja

Cybersecurity Insights & Inspiration

🧠 Key Concepts

Ransomware

  • Definition: A form of malicious software that encrypts an entire network or system and demands a ransom payment in order to decrypt the files.
  • Impact: Targets include corporations, hospitals, and government agencies.
  • Ransomware-as-a-Service (RaaS): Attackers now rent out ransomware kits, making it easier for low-skill criminals to launch large-scale attacks.
  • AI-Enhanced Ransomware: Artificial intelligence is increasingly used to automate, optimize, and scale cyberattacks.

AI in Cybersecurity

  • Used offensively: AI is leveraged to analyze systems, exploit vulnerabilities, and bypass traditional defenses.
  • Used defensively: AI is used to monitor traffic, detect anomalies, and respond in real-time to breaches.
  • Need for education: Understanding AI from both technical and strategic perspectives is critical to modern cybersecurity.

Zero-Day Vulnerabilities

  • Definition: A zero-day is a security flaw unknown to the vendor, exploited before a fix is issued.
  • Risk window: These exploits are especially dangerous because systems remain vulnerable until a patch is released and applied.
  • Cloud-based updates: Sometimes, systems don’t update until they pull from the cloud, increasing the exposure period.

Intellectual Property Theft

  • China reportedly steals over $100 billion worth of intellectual property every year.
  • Corporate espionage is a growing concern in sectors like biotech, aerospace, and AI.

πŸ‘€ People & Case Studies

Thosmaz

  • Tracks cybercriminals using their own methods, including ransomware.
  • Unique approach: Hacks criminals back using randomized ransomware tactics.
  • Long-term pursuit: Tracked a subject for 3 years before catching them due to a single mistake.
  • Emotion: β€œVery cool feeling to track someone that long and finally succeed.”

Victor

  • Big data expertise: Managed large datasets and systems across networks.
  • Impact: Opened the landscape for future cybersecurity innovations.
  • Visionary: Contributed to modern frameworks for data security.

Tricia

  • Took a leave of absence due to suspicious activity.
  • Discovered internal data theft: A group was stealing proprietary data and sharing it with other companies.
  • Resolution: Shut down the malicious group, entered legal negotiations with the companies involved.

πŸ’‘ Inspiration & Advice

  • Start with curiosity: Many experts began by reading books and exploring computer science in their free time.
  • Not too steep of a learning curve: With dedication and the right resources, anyone can build a solid foundation in cybersecurity.
  • Secure an IT background: Basics in networking, databases, operating systems, and scripting are essential.
  • Build people skills: Being a good leader and communicator is just as important as technical knowledge.
  • Know the essentials: Understand protocols, threat modeling, and risk assessment.

🏒 Sectors to Explore

  • Business side of cybersecurity: Includes policy, compliance, risk management, and client relations.
  • Network architecture: Building secure and scalable systems from the ground up.
  • AI & ML applications: Growing need for experts who can build or defend AI-driven tools.

🧠 Blog Requirements

Key Takeaways

  • Ransomware and AI are at the forefront of both cyber offense and defense.
  • Human error continues to be the most exploited vulnerability.
  • Passion and persistence (like Thosmaz) can lead to breakthroughs even after years.

What to Implement in the Future

  • More AI-integrated threat detection systems.
  • Better patching protocols to reduce zero-day exposure.
  • Increased cybersecurity education in schools and workplaces.

Why This Matters (Extra Credit Justification)

  • Demonstrates initiative and real-world relevance.
  • Shows understanding beyond the classroom.
  • Builds a bridge between theory and actual application in cybersecurity.