| Datum | Bron | Nieuws |
|---|
| 25-02 | Techcrunch | |
| 25-02 | Techcrunch | |
| 25-02 | Techcrunch | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Bleepingcomputer | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Nu.nl | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | Help Net Security | |
| 25-02 | BBC | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Infosecurity | |
| 25-02 | Security Magazine | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 25-02 | The Hacker News | |
| 24-02 | Help Net Security | |
| 24-02 | Help Net Security | |
| 24-02 | Help Net Security | |
| 24-02 | Infosecurity | |
| 24-02 | Security Magazine | |
| 24-02 | The Hacker News | |
| 24-02 | The Hacker News | |
| 24-02 | Help Net Security | |
| 24-02 | Help Net Security | |
| 24-02 | Help Net Security | |
| 24-02 | Help Net Security | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | Infosecurity | |
| 24-02 | The Hacker News | |
| 24-02 | The Hacker News | |
| 24-02 | The Hacker News | |
| 24-02 | The Hacker News | |
| 23-02 | Help Net Security | |
| 23-02 | Help Net Security | |
| 23-02 | Help Net Security | |
| 23-02 | Help Net Security | |
| 23-02 | Infosecurity | |
| 23-02 | Infosecurity | |
| 23-02 | The Hacker News | |
| 23-02 | The Hacker News | |
| 23-02 | Help Net Security | |
| 23-02 | Help Net Security | |
| 23-02 | Help Net Security | |
| 23-02 | Security Magazine | |
| 23-02 | Security Magazine | |
| 22-02 | Help Net Security | |
| 22-02 | The Hacker News | |
| 21-02 | The Hacker News | |
| 21-02 | The Hacker News | |
| 21-02 | The Hacker News | |
| 21-02 | Help Net Security | |
| 21-02 | Infosecurity | |
| 21-02 | Infosecurity | |
| 21-02 | Security Magazine | |
| 21-02 | Security Magazine | |
| 21-02 | Security Magazine | |
| 21-02 | Security Magazine | |
| 21-02 | The Hacker News | |
| 21-02 | The Hacker News | |
| 21-02 | The Hacker News | |
| 20-02 | Techcrunch | |
| 20-02 | Techcrunch | |
| 20-02 | Bleepingcomputer | |
| 20-02 | Bleepingcomputer | |