• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • A bug in the decryptor for the Ryuk ransomware could cause data loss
  • Google released PathAuditor to detect unsafe path access patterns
  • New 'PyXie' Python RAT targets multiple industries
  • China 3-5-2 directive orders state offices to remove foreign hardware and software
  • Google fixes a critical DoS flaw tracked as CVE-2019-2232 in Android
  • SEC Xtractor - Experts released an open-source hardware analysis tool
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "ransomare"

ransomare

Emsisoft released a free decryption tool for the STOP (Djvu) ransomware

Emsisoft firm has released a new free decryption tool the STOP (Djvu)...

October 19, 2019  By Pierluigi Paganini

Information Services Giant Wolters Kluwer hit by ransomware attack

Global information services company Wolters Kluwer took offline has taken...

May 9, 2019  By Pierluigi Paganini

FIN6 group starts using LockerGoga and Ryuk Ransomware

Security experts at FireEye observed the financially motivated group FIN6...

April 6, 2019  By Pierluigi Paganini

It has happened again, ransomware infected an LG Smart TV

The software engineer Darren Cauthon reported his LG Smart TV was infected...

January 3, 2017  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled