logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • Software rollout failure led to Devon & Cornwall cops recording zero crime for 3 months

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2999 (phpmyfaq) 31 May 2023
  • CVE-2023-2998 (phpmyfaq) 31 May 2023
  • CVE-2023-2933 (chrome) 30 May 2023
  • CVE-2023-2931 (chrome) 30 May 2023
  • CVE-2023-2934 (chrome) 30 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

TVEyes crashed when ransomware attacked the core server and engineering workstations

Posted on 1 February 2020

From 2-spyware.com

Ransomware attack causes crahs of TVEyes

Undisclosed ransomware virus attacked TVEyes, radio, and television monitoring service.[1] The media monitoring platform was down and many public relations agencies, political campaign leaders, newsroom people, and journalists lost access to a crucial tool.

Read more…

Posted in News

Post navigation

Previous post: Project-Black – Pentest/BugBounty Progress Control With Scanning Modules
Next post: HSTS Parser a simple tool to parse Firefox and Chrome’s HSTS databases into actually helpful forensic artifacts
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.