Top

Tag: Encryption


Access control, Security

The double-edged sword of zero trust

February 19, 2024

Via: Help Net Security

In an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating […]


Threats & Malware, Virus & Malware

Korean eggheads crack Rhysida ransomware and release free decryptor tool

February 13, 2024

Via: The Register

Some smart folks have found a way to automatically unscramble documents encrypted by the Rhysida ransomware, and used that know-how to produce and release a handy recovery tool for victims. Rhysida is a newish ransomware gang that has been around […]


Threats & Malware, Vulnerabilities

Raspberry Pi Pico cracks BitLocker in under a minute

February 7, 2024

Via: The Register

We’re very familiar with the many projects in which Raspberry Pi hardware is used, from giving old computers a new lease of life through to running the animated displays so beloved by retailers. But cracking BitLocker? We doubt the company […]


Threats & Malware, Virus & Malware

And that’s a wrap for Babuk Tortilla ransomware as free decryptor released

January 9, 2024

Via: The Register

Security researchers have put out an updated decryptor for the Babuk ransomware family, providing a free solution for victims of the Tortilla variant. A collaboration between Cisco Talos, Avast, and the Netherlands police led to the development of the new […]


Cyber-crime, Malware

Syrian group Anonymous Arabic distributes stealthy malware Silver RAT

January 9, 2024

Via: Security Affairs

Cyfirma researchers observed threat actors called ‘Anonymous Arabic’ distributing a C# remote access trojan called Silver RAT. The malware supports multiple capabilities, including bypassing anti-viruses and covertly launching hidden applications, browsers, and keyloggers. The hacker group is active on multiple […]


Privacy protection, Security

Preserving privacy through advanced encryption techniques

December 18, 2023

Via: Help Net Security

At its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those […]


Application security, Security

OpenSSL 3.2.0 released: New cryptographic algorithms, support for TCP fast open, and more!

November 27, 2023

Via: Help Net Security

OpenSSL is a full-featured toolkit for general-purpose cryptography and secure communication. The final version of OpenSSL 3.2.0 is now available. Major changes in OpenSSL 3.2.0 This release incorporates the following potentially significant or incompatible changes: The default SSL/TLS security level […]


Network security, Security

UK may demand tech world tell it about upcoming security features

November 7, 2023

Via: The Register

The UK government has set in train plans to introduce legislation requiring tech companies to let it know when they plan to introduce new security technologies and could potentially force them to disable when required. The measures were announced just […]


Access control, Security

New Tool Checks if Your Organization’s Secrets Have Leaked on GitHub

October 19, 2023

Via: SecureWorld

Securing secrets such as API keys, passwords, and credentials is a major challenge for developers today. It’s far too easy for these secrets to get exposed in public code repositories, logs, docker images, etc. To help solve this issue, GitGuardian […]


Network security, Security

FastestVPN just added new highly demanded feature

October 17, 2023

Via: TechRadar

After launching new Dedicated IP options about a month ago, a popular VPN service has just unveiled its latest advanced feature seeking to meet increased demand among its customers. FastestVPN users can now enjoy port-forwarding support across all its apps. […]


Privacy protection, Security

Swissbit introduces iShield Archive memory card that protects sensitive information

September 12, 2023

Via: Help Net Security

With ‘iShield Archive’, Swissbit introduces a new microSD card designed for encryption and access protection of video and image records, expanding the Swissbit iShield product line for plug-and-play security solutions. The card is intended particularly for manufacturers and users for […]


Access control, Security

Encryption Flaws in Popular Chinese Language App Put Users’ Typed Data at Risk

August 10, 2023

Via: The Hacker News

A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that could allow a malicious interloper to decipher the text typed by users. The findings from the University of Toronto’s Citizen […]


Access control, Security

Zenbleed: New Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at Risk

July 25, 2023

Via: The Hacker News

A new security vulnerability has been discovered in AMD’s Zen 2 architecture-based processors that could be exploited to extract sensitive data such as encryption keys and passwords. Discovered by Google Project Zero researcher Tavis Ormandy, the flaw – codenamed Zenbleed […]


Application security, Security

How to Improve Your API Security Posture

June 8, 2023

Via: The Hacker News

APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn’t come without major risks. Hackers can exploit vulnerabilities in APIs to gain unauthorized access to sensitive data […]


Network security, Security

5 Must-Know Facts about 5G Network Security and Its Cloud Benefits

May 26, 2023

Via: The Hacker News

5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones and IoT devices to cloud infrastructure. 5G networks are a critical part of all infrastructure […]


Access control, Security

Solving Your Teams Secure Collaboration Challenges

May 12, 2023

Via: The Hacker News

In today’s interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees, secure collaboration has become increasingly vital. However, collaboration can pose a security risk if not managed properly. To ensure that collaboration remains secure, organisations need […]


Threats & Malware, Virus & Malware

New Ransomware Strain ‘CACTUS’ Exploits VPN Flaws to Infiltrate Networks

May 9, 2023

Via: The Hacker News

Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks. “Once inside the network, CACTUS actors attempt to enumerate local […]


Cyber-crime, Malware

RTM Locker’s First Linux Ransomware Strain Targeting NAS and ESXi Hosts

April 27, 2023

Via: The Hacker News

The threat actors behind RTM Locker have developed a ransomware strain that’s capable of targeting Linux machines, marking the group’s first foray into the open source operating system. “Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to […]


Access control, Security

Google 2FA Syncing Feature Could Put Your Privacy at Risk

April 27, 2023

Via: Dark Reading

After a 13-year-long wait, Google Authenticator has added a 2FA account-sync feature that allows its users to back up their 2FA code sequences into the cloud, after which they can restore them back into a new device. Though the process […]


Cyber-crime, Malware

Rorschach ransomware has the fastest file-encrypting routine to date

April 4, 2023

Via: Security Affairs

Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) researchers detected a previously unknown ransomware strain, dubbed Rorschach ransomware, that was employed in attack against a US-based company. The experts pointed out that the Rorschach ransomware appears to […]