CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

"Locky" Ransomware Encrypts Unmapped Network Shares

Feb. 18, 2016

Security researchers have discovered a new piece of ransomware called Locky, which uses AES encryption algorithm to encrypt both local files and files on network shares, even if t…

Attackers Use Fake Patch to Hack Magento Sites

Feb. 16, 2016

Cybercriminals are exploiting an old vulnerability in the Magento ecommerce platform to compromise online shops and steal sensitive information, using a piece of malware disguised…

Remote Code Execution Flaw Patched in glibc Library

Feb. 16, 2016

Researchers have discovered a serious remote code execution vulnerability in the GNU C Library, also known as glibc.

Design Flaw Exposes ASUS Routers to Remote Attacks

Feb. 14, 2016

A security researcher discovered that some SOHO routers from ASUS can be accessed from the Internet even if the WAN access feature is disabled. The vendor has prepared a firmware …

Here's How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files

Feb. 14, 2016

Over the last few years, we have seen several types of Ransomware malware that demand a whopping amount of money from users for the retrieval of their locked, compromised sensiti…

  • Previous
  • ...
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.