• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • From iPhone to NT AUTHORITY\SYSTEM - exploit 'Printconfig' dll with a real-world example
  • Iran announced to have foiled a second cyber-attack in a week
  • Largest hospital system in New Jersey was hit by ransomware attack
  • Security Affairs newsletter Round 244
  • A malvertising campaign targets iPhone users with Krampus-3PC
  • Rooster Teeth Productions suffered a payment card breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "Tox"

Tox

FAKBEN Ransomware-as-a-service emerges from the underground

FAKBEN is offering a professional Ransomware-as-a-service that relies...

November 13, 2015  By Pierluigi Paganini

ORX Locker, the new Darknet Ransomware-as-a-service platform

Security experts at Sensecy have uncovered ORX-Locker, a Darknet Ransomware-as-a-service...

September 1, 2015  By Pierluigi Paganini

Tox ransomware platform builder is now available for sale

The owner of the Tox ransomware builder is offering for sale the platform...

June 8, 2015  By Pierluigi Paganini

Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow...

May 26, 2015  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled