IT Sicherheitsnews
Cybersecurity News und Artikel über Schwachstellen, Exploits, Hacks, Gesetze, Spam, Viren, Malware, Trojaner

Main menu

Skip to content
  • Social Media
    • Tägliche Zusammenfassung
    • Abonnieren
  • IT Security News in English
  • IT Sicherheitsberatung
  • Werbung mit uns
  • Impressum
    • Kontakt
    • Datenschutzerklärung
Deutsch – WeLiveSecurity

Schwachstellen vier verschiedener Verschlüsselungs-Trojaner

2016-09-22 03:09

Wir haben die Verschlüsselungsmethoden der vier Krypto-Ransomware-Familien CryptoDefense, TorrentLocker, TeslaCrypt und Petya einmal genauer beleuchtet.

[…]

 

IT Security News mobile apps.

Lesen Sie den ganzen Artikel: Schwachstellen vier verschiedener Verschlüsselungs-Trojaner

Related

Tags: autopost Deutsch – WeLiveSecurity

Post navigation

← l+f: Böse USB-Sticks in Briefkästen
Forciertes Update: Auch weniger Akkuleistung für Galaxy Note 7 in Deutschland →

RSS IT Security News

  • Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign 27/09/2025
  • Hackers Use Fake Invoices to Spread XWorm RAT via Office Files 27/09/2025
  • New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads 27/09/2025
  • Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations 27/09/2025
  • Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users 27/09/2025
  • Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins 27/09/2025
  • Complete Guide to Understanding Risk-Based Authentication 27/09/2025
  • LummaStealer Technical Details Uncovered Using ML-Based Detection Approach 27/09/2025
  • Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups 27/09/2025
  • Alibaba unveils $53B global AI plan – but it will need GPUs to back it up 27/09/2025
  • 17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released 27/09/2025
  • The Complex Landscape of AI and Cybersecurity 27/09/2025
  • Are Your Secrets Management Practices Up to Par? 27/09/2025
  • Staying Ahead of Cyber Threats with Proactive NHIs 27/09/2025
  • Researcher Finds Entra ID Weakness That Could Have Granted Global Admin Access 27/09/2025
  • USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies 27/09/2025
  • Week in Review: Jaguar Land Rover attack, indirect prompt injections, card farms in NYC 26/09/2025
  • New tool: convert-ts-bash-history.py, (Fri, Sep 26th) 26/09/2025
  • Friday Squid Blogging: Jigging for Squid 26/09/2025
  • Cyber threat-sharing law set to shut down, along with US government 26/09/2025

Social Media

twitter FB
IT Security News Intl.

Top Posts

  • [UPDATE] [kritisch] Fortra GoAnywhere MFT: Schwachstelle ermöglicht Command Injection
  • [UPDATE] [hoch] Omnissa Workspace ONE UEM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
  • Dussmann Service: Oliver Vellage wird neuer Geschäftsführer
  • [UPDATE] [mittel] Red Hat Enterprise Linux (assimp): Mehrere Schwachstellen ermöglichen Denial of Service
  • FiDA-Verordnung: Fünf Herausforderungen für Finanzunternehmen
  • Überwachung: Die Schweiz zerlöchert ihren Datenschutz
  • Securitas sichert das 190. Oktoberfest in München
  • Kritische Lücke in Fortra GoAnywhere MFT wurde wohl von Angreifern ausgenutzt

Kategorien

Meta

  • Anmelden
  • Feed der Einträge
  • Kommentar-Feed
  • WordPress.org

Copyright © 2025 IT Sicherheitsnews. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.