February 19, 2024
Via: Help Net SecurityIn an era defined by relentless cyber threats and evolving attack vectors, traditional security models are proving increasingly inadequate to safeguard sensitive information. Unlike conventional systems that often rely on perimeter defenses, zero trust adopts a more discerning philosophy, treating […]
Threats & Malware, Virus & Malware
February 13, 2024
Via: The RegisterSome smart folks have found a way to automatically unscramble documents encrypted by the Rhysida ransomware, and used that know-how to produce and release a handy recovery tool for victims. Rhysida is a newish ransomware gang that has been around […]
Threats & Malware, Vulnerabilities
February 7, 2024
Via: The RegisterWe’re very familiar with the many projects in which Raspberry Pi hardware is used, from giving old computers a new lease of life through to running the animated displays so beloved by retailers. But cracking BitLocker? We doubt the company […]
Threats & Malware, Virus & Malware
January 9, 2024
Via: The RegisterSecurity researchers have put out an updated decryptor for the Babuk ransomware family, providing a free solution for victims of the Tortilla variant. A collaboration between Cisco Talos, Avast, and the Netherlands police led to the development of the new […]
January 9, 2024
Via: Security AffairsCyfirma researchers observed threat actors called ‘Anonymous Arabic’ distributing a C# remote access trojan called Silver RAT. The malware supports multiple capabilities, including bypassing anti-viruses and covertly launching hidden applications, browsers, and keyloggers. The hacker group is active on multiple […]
December 18, 2023
Via: Help Net SecurityAt its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those […]
Application security, Security
November 27, 2023
Via: Help Net SecurityOpenSSL is a full-featured toolkit for general-purpose cryptography and secure communication. The final version of OpenSSL 3.2.0 is now available. Major changes in OpenSSL 3.2.0 This release incorporates the following potentially significant or incompatible changes: The default SSL/TLS security level […]
November 7, 2023
Via: The RegisterThe UK government has set in train plans to introduce legislation requiring tech companies to let it know when they plan to introduce new security technologies and could potentially force them to disable when required. The measures were announced just […]
October 19, 2023
Via: SecureWorldSecuring secrets such as API keys, passwords, and credentials is a major challenge for developers today. It’s far too easy for these secrets to get exposed in public code repositories, logs, docker images, etc. To help solve this issue, GitGuardian […]
October 17, 2023
Via: TechRadarAfter launching new Dedicated IP options about a month ago, a popular VPN service has just unveiled its latest advanced feature seeking to meet increased demand among its customers. FastestVPN users can now enjoy port-forwarding support across all its apps. […]
September 12, 2023
Via: Help Net SecurityWith ‘iShield Archive’, Swissbit introduces a new microSD card designed for encryption and access protection of video and image records, expanding the Swissbit iShield product line for plug-and-play security solutions. The card is intended particularly for manufacturers and users for […]
August 10, 2023
Via: The Hacker NewsA widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that could allow a malicious interloper to decipher the text typed by users. The findings from the University of Toronto’s Citizen […]
July 25, 2023
Via: The Hacker NewsA new security vulnerability has been discovered in AMD’s Zen 2 architecture-based processors that could be exploited to extract sensitive data such as encryption keys and passwords. Discovered by Google Project Zero researcher Tavis Ormandy, the flaw – codenamed Zenbleed […]
Application security, Security
June 8, 2023
Via: The Hacker NewsAPIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn’t come without major risks. Hackers can exploit vulnerabilities in APIs to gain unauthorized access to sensitive data […]
May 26, 2023
Via: The Hacker News5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones and IoT devices to cloud infrastructure. 5G networks are a critical part of all infrastructure […]
May 12, 2023
Via: The Hacker NewsIn today’s interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees, secure collaboration has become increasingly vital. However, collaboration can pose a security risk if not managed properly. To ensure that collaboration remains secure, organisations need […]
Threats & Malware, Virus & Malware
May 9, 2023
Via: The Hacker NewsCybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks. “Once inside the network, CACTUS actors attempt to enumerate local […]
April 27, 2023
Via: The Hacker NewsThe threat actors behind RTM Locker have developed a ransomware strain that’s capable of targeting Linux machines, marking the group’s first foray into the open source operating system. “Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to […]
April 27, 2023
Via: Dark ReadingAfter a 13-year-long wait, Google Authenticator has added a 2FA account-sync feature that allows its users to back up their 2FA code sequences into the cloud, after which they can restore them back into a new device. Though the process […]
April 4, 2023
Via: Security AffairsCheck Point Research (CPR) and Check Point Incident Response Team (CPIRT) researchers detected a previously unknown ransomware strain, dubbed Rorschach ransomware, that was employed in attack against a US-based company. The experts pointed out that the Rorschach ransomware appears to […]