SlideShare a Scribd company logo
1 of 9
Download to read offline
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
HACKERโ€™S HEIST
CACTUS
0
1
1
0
1
0
0
0
0
1
1
1
1
0
1
1
0
1
1
1
1
0
1
0
1
1
0
1
0
0
1
0
0
1
1
0
1
1
0
1
0
1
1
0
1
0
1
1
0
1
0
0
1
1
0
0
1
0
0
0
1
1
0
1
0
0
0
0
1
1
1
1
0
1
1
0
1
1
1
1
0
1
0
1
1
0
1
0
0
1
0
0
1
1
0
1
1
0
1
0
1
1
0
1
0
1
1
0
1
0
0
1
1
0
0
1
0
0
0
1
1
0
1
0
0
0
0
1
1
1
1
0
1
1
0
1
1
1
1
0
1
0
1
1
0
1
0
0
1
0
0
1
1
0
1
1
0
1
0
1
1
0
1
0
1
1
0
1
0
0
1
1
0
0
1
0
0
0
1
1
0
1
0
0
0
0
1
1
1
1
0
1
1
0
1
1
1
1
0
1
0
1
1
0
1
0
0
1
0
0
1
1
0
1
1
0
1
0
1
1
0
1
0
1
1
0
1
0
0
1
1
0
0
1
0
0
0101 11 111011 0 1 101 0 111
0001 00 111 010 00 101 0 101
0101 11 111011 0 1 101 0 111
0001 00 111 010 00 101 0 101
0101 11 111011 0 1 101 0 111
0001 00 111 010 00 101 0 101
PAY FOR
UNLOCK
*********
RANSOMWARE
WHAT IS
CACTUS
Cactus Ransomware sets itself
apart with its distinctive encryption
methods, making it difficult to detect
by security tools. It exploits VPN
vulnerabilities to infiltrate networks
instead of relying on phishing emails,
and it possesses the uncommon
ability to self-encrypt, enhancing
its chances of remaining
undetected on compromised
systems.
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
RANSOMWARE
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed diam nonummy
LOREM IPSUM
The attacker gets into the victim's
network using a weakness in a
VPN appliance. They do this by
taking advantage of known
vulnerabilities in VPN appliances
that haven't been fixed
or updated.
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
CACTUS
Attack Tactics Techniques
& Procedures
RANSOMWARE
STEP 1
CONNECT
VPN
The attacker installs the Cactus
ransomware on the victim's system.
This can be done through various
methods, such as phishing emails,
malicious attachments, or drive
by downloads.
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
The attacker conducts an internal
network scan using tools like
SoftPerfect Network Scanner or
PSnmap to create a map of the
environment.
STEP 3
STEP 2
!
* * * * * * * * *
* * * * * * * * *
To facilitate lateral movement, the
attacker deploys the CobaltStrike
post-exploitation framework
and Chisel proxying tool.
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
The attacker installs Remote
Monitoring and Management
(RMM) tools on compromised systems,
enabling remote access and file
pushing capabilities.
STEP 5
STEP 4
The attacker employs the Rclone
tool to conduct data theft from
the environment, automating the
process for data exfiltration.
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
STEP 7
The attacker executes a script
to disable widely used anti-virus
tools to decrease the chances
of their tools being detected
and blocked.
STEP 6
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
The attacker utilizes a PowerShell
script to distribute ransomware
across all systems within the
environment.
STEP 8
www.infosectrain.com
@infosectrain
#
l
e
a
r
n
t
o
r
i
s
e
TIPS TO PROTECT YOURSELF FROM
CACTUS
Keeping VPN appliances up to
date with the latest security patches.
RANSOMWARE
01
Using network monitoring tools to
detect suspicious activity.
02
Educating yourself about ransomware
attacks.
03
Implementing strong password policies
and enforcing multi-factor authentication.
04
FOUND THIS USEFUL?
Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

More Related Content

Similar to cactus ransomware.pdf

Threat stack aws
Threat stack awsThreat stack aws
Threat stack aws
Jen Andre
ย 
Sniffjoke 0.5 anticipation - hack.lu 2011
Sniffjoke 0.5 anticipation - hack.lu 2011Sniffjoke 0.5 anticipation - hack.lu 2011
Sniffjoke 0.5 anticipation - hack.lu 2011
Not In my Name
ย 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
Kunal Thakur
ย 
Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01
Nitish Bhardwaj
ย 

Similar to cactus ransomware.pdf (20)

Spyware and Malware Awareness
Spyware and Malware AwarenessSpyware and Malware Awareness
Spyware and Malware Awareness
ย 
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐ญ๐ก๐ž ๐„๐ง๐ข๐ ๐ฆ๐š ๐จ๐Ÿ ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž & ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐ญ๐ก๐ž ๐„๐ง๐ข๐ ๐ฆ๐š ๐จ๐Ÿ ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž & ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐ญ๐ก๐ž ๐„๐ง๐ข๐ ๐ฆ๐š ๐จ๐Ÿ ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž & ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐ญ๐ก๐ž ๐„๐ง๐ข๐ ๐ฆ๐š ๐จ๐Ÿ ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž & ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž
ย 
Guarding Against Digital Intruders SPYWARE & MALWARE AWARENESS.pdf
Guarding Against Digital Intruders SPYWARE & MALWARE AWARENESS.pdfGuarding Against Digital Intruders SPYWARE & MALWARE AWARENESS.pdf
Guarding Against Digital Intruders SPYWARE & MALWARE AWARENESS.pdf
ย 
Guarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware AwarenessGuarding Against Digital Intruders Spyware & Malware Awareness
Guarding Against Digital Intruders Spyware & Malware Awareness
ย 
8 Simple Ways to Secure Hybrid Cloud.pdf
8 Simple Ways to Secure Hybrid Cloud.pdf8 Simple Ways to Secure Hybrid Cloud.pdf
8 Simple Ways to Secure Hybrid Cloud.pdf
ย 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - A...
ย 
Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)Fighting fraud: finding duplicates at scale (Highload+ 2019)
Fighting fraud: finding duplicates at scale (Highload+ 2019)
ย 
Unravelling The World of Viruses.pdf
Unravelling The World of Viruses.pdfUnravelling The World of Viruses.pdf
Unravelling The World of Viruses.pdf
ย 
AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0AWS IoT Update - re:Invent Comes to London 2.0
AWS IoT Update - re:Invent Comes to London 2.0
ย 
Threat stack aws
Threat stack awsThreat stack aws
Threat stack aws
ย 
Having Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security AnalysisHaving Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security Analysis
ย 
Pts syllabus
Pts syllabusPts syllabus
Pts syllabus
ย 
SWAT Style โ€“ Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style โ€“ Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style โ€“ Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style โ€“ Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
ย 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
ย 
CoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLVCoinMiners are Evasive - BsidesTLV
CoinMiners are Evasive - BsidesTLV
ย 
Sniffjoke 0.5 anticipation - hack.lu 2011
Sniffjoke 0.5 anticipation - hack.lu 2011Sniffjoke 0.5 anticipation - hack.lu 2011
Sniffjoke 0.5 anticipation - hack.lu 2011
ย 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
ย 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
ย 
Transform process to protect product samples embedded with intellectual property
Transform process to protect product samples embedded with intellectual propertyTransform process to protect product samples embedded with intellectual property
Transform process to protect product samples embedded with intellectual property
ย 
Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01Internet of-things-slideshare-140819153732-phpapp01
Internet of-things-slideshare-140819153732-phpapp01
ย 

More from infosec train

Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
infosec train
ย 

More from infosec train (20)

Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
ย 
Data Protection Officer Training.pdf InfosecTrain
Data Protection Officer Training.pdf InfosecTrainData Protection Officer Training.pdf InfosecTrain
Data Protection Officer Training.pdf InfosecTrain
ย 
Azure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdfAzure Administrator and Security Training.pdf
Azure Administrator and Security Training.pdf
ย 
SOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrainSOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrain
ย 
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdfCISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
CISSP Domain 1: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ.pdf
ย 
CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdf
ย 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
ย 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrain
ย 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrain
ย 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTrain
ย 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrain
ย 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
ย 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdf
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
๐ƒ๐š๐ญ๐š ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‚๐ก๐š๐ฅ๐ฅ๐ž๐ง๐ ๐ž๐ฌ & ๐’๐จ๐ฅ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!.pdf
ย 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
ย 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdf
ย 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdf
ย 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01
ย 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
ย 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
ย 

Recently uploaded

ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinhฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
leson0603
ย 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
EADTU
ย 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Nguyen Thanh Tu Collection
ย 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
ย 
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ไธญ ๅคฎ็คพ
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ไธญ ๅคฎ็คพ
ย 
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdiaPersonalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
EADTU
ย 

Recently uploaded (20)

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
ย 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
ย 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
ย 
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinhฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ฤeฬ‚ฬ€ tieng anh thpt 2024 danh cho cac ban hoc sinh
ย 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
ย 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
ย 
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
Tแป”NG HแปขP Hฦ N 100 ฤแป€ THI THแปฌ TแปT NGHIแป†P THPT TOรN 2024 - Tแปช CรC TRฦฏแปœNG, TRฦฏแปœNG...
ย 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
ย 
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝๆœƒ่€ƒ่‹ฑ่ฝ
ย 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
ย 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
ย 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ย 
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡ๆœƒ่€ƒ่‹ฑๆ–‡
ย 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
ย 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
ย 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
ย 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
ย 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
ย 
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdiaPersonalisation of Education by AI and Big Data - Lourdes Guร rdia
Personalisation of Education by AI and Big Data - Lourdes Guร rdia
ย 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
ย 

cactus ransomware.pdf