encryption
-
Italy Data Protection Authority Warns Websites Against Use of Google Analytics
Following the footsteps of Austria and France, the Italian Data Protection Authority has become the latest regulator to find the…
Read More » -
Researchers Uncover Ways to Break the Encryption of ‘MEGA’ Cloud Storage Service
A new piece of research from academics at ETH Zurich has identified a number of critical security issues in the…
Read More » -
A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage
A “dangerous piece of functionality” has been discovered in Microsoft 365 suite that could be potentially abused by a malicious…
Read More » -
BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers
Microsoft is warning that the BlackCat ransomware crew is leveraging exploits for unpatched Exchange server vulnerabilities to gain access to…
Read More » -
New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs
A newly discovered security vulnerability in modern Intel and AMD processors could let remote attackers steal encryption keys via a…
Read More » -
Even the Most Advanced Threats Rely on Unpatched Systems
Common cybercriminals are a menace, there’s no doubt about it – from bedroom hackers through to ransomware groups, cybercriminals are…
Read More » -
Hacking Scenarios: How Hackers Choose Their Victims
Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. May 6th, 2022 is a recent example. The…
Read More » -
CISA Warned About Critical Vulnerabilities in Illumina’s DNA Sequencing Devices
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Food and Drug Administration (FDA) have issued an advisory about critical…
Read More » -
Researchers Demonstrate Ransomware for IoT Devices That Targets IT and OT Networks
As ransomware infections have evolved from purely encrypting data to schemes such as double and triple extortion, a new attack…
Read More » -
New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers
An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure,…
Read More »