• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • From iPhone to NT AUTHORITY\SYSTEM - exploit 'Printconfig' dll with a real-world example
  • Iran announced to have foiled a second cyber-attack in a week
  • Largest hospital system in New Jersey was hit by ransomware attack
  • Security Affairs newsletter Round 244
  • A malvertising campaign targets iPhone users with Krampus-3PC
  • Rooster Teeth Productions suffered a payment card breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "CryptXXX"

CryptXXX

Victims of the CryptXXX v.3 can now use a free tool to decrypt their files

Security researchers have released a decryption tool for unlocking files...

December 21, 2016  By Pierluigi Paganini

Afraidgate campaign switches from CryptXXX to Locky Ransomware

Operators behind the Afraidgate campaign continue to leverage on Neutrino...

August 2, 2016  By Pierluigi Paganini

Crooks made $50,000 in a few weeks with CryptXXX Ransomware

Security experts from the firm SentinelOne monitored a recent CryptXXX...

June 28, 2016  By Pierluigi Paganini

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns...

June 10, 2016  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled