Port 22

Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection