CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

"Locky" Ransomware Encrypts Unmapped Network Shares

Feb. 18, 2016

Security researchers have discovered a new piece of ransomware called Locky, which uses AES encryption algorithm to encrypt both local files and files on network shares, even if t…

Attackers Use Fake Patch to Hack Magento Sites

Feb. 16, 2016

Cybercriminals are exploiting an old vulnerability in the Magento ecommerce platform to compromise online shops and steal sensitive information, using a piece of malware disguised…

Remote Code Execution Flaw Patched in glibc Library

Feb. 16, 2016

Researchers have discovered a serious remote code execution vulnerability in the GNU C Library, also known as glibc.

Design Flaw Exposes ASUS Routers to Remote Attacks

Feb. 14, 2016

A security researcher discovered that some SOHO routers from ASUS can be accessed from the Internet even if the WAN access feature is disabled. The vendor has prepared a firmware …

Here's How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files

Feb. 14, 2016

Over the last few years, we have seen several types of Ransomware malware that demand a whopping amount of money from users for the retrieval of their locked, compromised sensiti…

  • Previous
  • ...
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • ...
  • Next

All content is available under license Creative Commons State the origin - preserve it 3.0  2019

All content is archived on the WebArchive of the National Library of the Czech Republic.

is the operator of CSIRT.CZ.