Arcadia

Video games… everyone tells him it’s not a matter of life or death. But in Arcadia, the rules are about to change. Buckle up for a hyper-speed style ride where even your wildest dreams become possible. Join Lucas Stafford on a journey through epic reality where the only escape is to beat the game. But as time runs out, there’s more than just a vi…
2 CHAPTERS 2.4k views 1 New chapter Every 30 days

Arcadia: The Experience

Video games… everyone tells you it’s not a matter of life or death. But in Arcadia, the rules are about to change. Get ready for the ride of your life as you battle your way through choices left and right. The power is in your hands, the choice is yours. Play Lucas’s story for yourself and experience the wonder! Can YOU beat Arcadia? This is an …
4 CHAPTERS 2.6k views 1 New chapter Every Saturday

The Collected Stories of Two Hemispheres

This is a social commentary about the northern and southern hemispheres of our world. The thoughts, feelings and actions that make us similar and, those that divide us. The goal of the written project is to bring us all closer together and free from conflict by seeing the world from each others perspective.
#1 in Steampunk 4 CHAPTERS 30.0k views 24 14 Story completed

ARTICLE D

Non Verified story This is a theory of Vijay shriram which is about the life after death. Read this just as a theory, don't take it serious. This article is just a thought said by Vijay shriram.
Short tale 59 views Story completed

Why is physical security important? A cybersecurity POV

Non Verified story Modern day attackers are orchestrating hybrid attacks that target physical assets. It calls for improved awareness and prioritization of physical security.
1 chapter 243 views Story completed
Blog Story

ICBC bank ransomware attack, World’s biggest bank hacked

Non Verified story ICBC: World’s biggest bank hacked due to suspected Citrix Bleed vulnerability (CVE-2023-4966) More details for visit: https://sharkstriker.com/blog/icbc-bank-ransomware-attack/
1 chapter 246 views Story completed
Blog Story

Advanced Persistent Threats (APT): 5 Ways to Identify an APT Attack

Non Verified story APT or Advanced Persistent Threat is a type of cyber-attack where an attacker or group of attackers target highly specific targets with an intent to steal sensitive data without being detected for a long time More details for visit: https://sharkstriker.com/guide/advanced-persistent-threats-apt-why-you-should-know-about-them/
1 chapter 297 views Story completed
Blog Story

Death Wish

Non Verified story A girl who has passed sees the real world and has one chance to make things right or live in hell. Along the way though, he heart finds love and her world becomes a maze she can’t see or maybe even get out alive.
1 chapter 347 views New chapter Every Monday

Protecting your IT infrastructure with Security Configuration Assessment

Non Verified story Discover how SharkStriker STRIEGO, a unified, human led, machine accelerated unified security platform makes security assessments based on CIS based benchmarks easier. More details for visit: https://sharkstriker.com/guide/here-is-how-striego-makes-security-assessment-a-whole-lot-easier-for-you/
1 chapter 436 views Story completed
Blog Story

24/7 SOC as a service | SharkStriker

Non Verified story Gain round the clock comprehensive security from a team of cybersecurity analysts and cyber security experts with SharkStriker’s SOC as a service. More details for visit: https://sharkstriker.com/services/soc/
1 chapter 665 views Story completed
Blog Story

Critical CVIS 10-rated Zero-day Webp vulnerability wildly exploited. Reassigned to CVE-2023-5129.

Non Verified story Google’s libwebp based zero-day vulnerability is now reassigned to CVE 2023-5129. It is wildly exploited. Attackers are using webp images to transmit malicious codes to extract sensitive information from their victims. More details for visit our website: https://sharkstriker.com/blog/critical-cvis-10-rated-zero-day-webp-vulnerability-wildly-exploi…
1 chapter 1.0k views Story completed
Blog Story

STRIEGO by SharkStriker: A holistic cybersecurity platform

Non Verified story A unified multi-tenant open architecture human-led AI/ML-driven security platform designed to meet the cybersecurity needs of today and tomorrow. SharkStriker Striego is a multi-tenant, open-architecture, human-led AI/ML-driven security platform designed to solve the most immediate challenges in cybersecurity and compliance. It helps organizations…
1 chapter 1.0k views Story completed
Blog Story

What is Incident Response? why do organizations need it?

Non Verified story Incident response comprises all the security measures taken to detect, respond and contain a cyber incident such as data breach or a ransomware attack. More details for visit our website: https://sharkstriker.com/guide/what-is-incident-response-a-comprehensive-guide/
1 chapter 1.2k views Story completed
Blog Story

What is Whaling attacks? how to prevent them | SharkStriker

Non Verified story Whaling attacks are a kind of phishing attacks aimed towards the top management executives. Safeguard your email by double checking them for syntax, mail protection software etc. More details for visit our website: https://sharkstriker.com/guide/what-is-whaling-how-do-you-defend-against-it/
1 chapter 1.2k views Story completed
Blog Story

What Is the MITRE ATT&CK Framework? | Get the 101 Guide

Non Verified story The MITRE ATT&CK framework helps cyber security experts gain accurate information on the latest TTPs deployed by attackers from an adversarial point of view, assisting defense experts to design their defenses with precision. More Details For Visit Our Website: https://sharkstriker.com/guide/what-is-mitre-attack-framework/
1 chapter 1.2k views Story completed
Blog Story

Skyrealm

Non Verified story In a city built on the ground can a sky dweller save it
4 CHAPTERS 1.4k views 1 New chapter Every week

The rising threat of Blueshell malware for Windows, Mac, and Linux users

Non Verified story Increased number of Windows, Mac and Linux users face the threat of Blueshell malware that is a type of Trojan malware. SharkStriker can assist businesses through EDR and its round the clock SOC team. More details for visit our website: https://sharkstriker.com/blog/the-rising-threat-of-blueshell-malware-for-windows-mac-and-linux-users/
1 chapter 1.4k views Story completed
Blog Story

The rising threat of Blueshell malware for Windows, Mac, and Linux users

Non Verified story Increased number of Windows, Mac and Linux users face the threat of Blueshell malware that is a type of Trojan malware. SharkStriker can assist businesses through EDR and its round the clock SOC team. More details for visit our website: https://sharkstriker.com/blog/the-rising-threat-of-blueshell-malware-for-windows-mac-and-linux-users/
1 chapter 1.4k views Story completed
Blog Story

Ensure comprehensive fulfillment of ISO 27001 with compliance services

Non Verified story SharkStriker channels its expertise in compliance fulfillment to seamlessly assist organizations to fulfill their ISO 27001 compliance requirements More details for visit our website: https://sharkstriker.com/services/compliance/iso-27001/
1 chapter 1.4k views Story completed
Blog Story

Gary B. Flom’s Efforts to Convert ICE Commercial Fleets to Sustainable Platforms

Non Verified story Gary B. Flom is not an unfamiliar name in the automotive industry. He has been in leading roles at some of the biggest companies in the world like Ford Motors. From being a U.S. Marine to becoming a renowned philanthropist, Gary’s journey has been truly remarkable
1 chapter 2.8k views In progress
Blog Story

How Much Does Skin Tightening Cost?

Non Verified story In recent years, skin tightening has become an increasingly popular way to improve the appearance of sagging or loose skin.
1 chapter 2.8k views New chapter Every 10 days
Blog Story

Rain in june

Non Verified story The report noted that the next five years "will be highly winter-biased," because the Northern Hemisphere winter is already 4-5°F warmer than the 20th-century average. As a result, the NOAA noted that global temperatures in the five years between 2018 and 2026 "will be somewhat lower than average, but not substantially."
1 chapter 2.5k views Story completed
Blog Story