Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Encryption

Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

7 February 2023

The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it …

Tags Algorithms, Cyber Attack, Encryption, Linux, OS

Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized

6 February 2023

So far, authorities have arrested 48 people in connection with Exclu, discovered two drug labs and a cocaine-processing facility, and …

Tags Crackdown, Cyber Crime, Cybercrime, Encrypted, Encryption

What Is Encryption as a Service (EaaS)? A Definitive Guide

3 February 2023

The thing is, many businesses need help properly encrypting all the data on their machines, servers, and the cloud. And this is exactly …

Tags Encryption, Guides, Is, Malware, Services

AES Encryption and Decryption in Java – AES Encoding Decoding Example Tutorial

2 February 2023

Hello Java programmers, if you are looking for an example to encrypt and decrypt a test using the AES algorithm in Java then you have come …

Tags AES, Decryption, Encoding, Encryption, Examples

Automatically decrypt your disk using TPM2

1 February 2023

Entering the passphrase to decrypt the disk at boot can become quite tedious. On modern systems a secure hardware chip called “TPM” …

Tags Encryption, Fedora, GNU, GNU/Linux, GNU/Linux Distributions

If a locked filing cabinet is stolen along with its key, can you still say it’s locked? GoTo thinks you can

30 January 2023

Last week, GoTo (the parent company of LastPass, which has been the victim of some recent horrendous security breaches itself) announced it …

Tags Encryption, GoTo, IT, LastPass, Malware

Your 10-Minute Guide to PKI and How Internet Encryption Works

25 January 2023

From securing e-commerce transactions to encrypting data sent via email and verifying software packages, Public Key Infrastructure (PKI) …

Tags Email Security, Encryption, Guides, How, Internet

Chinese researchers: RSA is breakable. Others: Do not panic!

25 January 2023

Quantum computing poses a great opportunity but also a great threat to internet security; certain mathematical problems that form the basis …

Tags Chinese, Encryption, Malware, Others, RSA

openSUSE Linux Switches to 4096 Bit RSA Key for Its Repositories

24 January 2023

The RSA key will be applied to the openSUSE Tumbleweed rolling release as well as to the Leap, Backports, and SLE …

Tags Bits, Developers, Encryption, IT, Keys

A Hands-On Approach to Symmetric-Key Encryption

19 January 2023

In this article, we will learn how symmetric-key encryption works from a practical perspective using …

Tags Approach, Developers, Encryption, Hands-On, IT

QuSecure Achieves Breakthrough in Post-Quantum Encryption over Public Internet

18 January 2023

SAN MATEO, Calif., Jan. 18, 2023 — QuSecure, a leader in post-quantum cybersecurity (PQC), today launched QuEverywhere, its most recent …

Tags Breakthrough, Encryption, Internet, Malware, Public

Amazon S3 Encrypts All New Objects with AES-256

14 January 2023

Since January 5th Amazon S3 encrypts all new objects by default with AES-256 to protect data at rest. S3 automatically applies server-side …

Tags Cloud, Development, DevOps, Encryption, Hybrid Cloud

Three key security themes from AWS re:Invent 2022

13 January 2023

AWS re:Invent 2022 AWS re:Invent returned to Las Vegas, Nevada, November 28 to December 2, 2022. After a virtual event in 2020 and a hybrid …

Tags Amazon Macie, AWS Config, Encryption, Live Events, Malware

Free decryptor for victims of MegaCortex ransomware released

12 January 2023

The experts at security firm Bitdefender have released a universal decryptor for victims of the MegaCortex family of ransomware. …

Tags Encryption, IT, Malware, MegaCortex, Ransomware
Older posts
Page1 Page2 … Page127 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »