Home Tags Cryptography

Tag: Cryptography

Forward-secrecy protocol comes with the 28th draft A much-needed update to internet security has finally passed at the Internet Engineering Task Force (IETF), after four years and 28 drafts.…
Backdoor allows attacker to recover private keys stored on Ledger hardware wallets.
'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.
Freebie tool restored after 4 weeks offline The systems of freebie open-source code scanning tool Coverity Scan were hacked and abused to run a cryptocurrency mining operation, its operator has confirmed.…
Bouncy Castle BKS version 1 keystore files use an HMAC that is only 16 bits long,which can allow an attacker to crack a BKS-V1 keystore file in seconds.
Researchers believe a new encryption technique may be key to maintaining a balance between user privacy and government demands.
The Ethereum cryptocurrency is below $500 for the first time since 2017.
Study examines the cutting edge of cybercrime Crooks are increasingly turning to Monero over Bitcoin, according to a new study on the economics of cybercrime.…
Those behind the campaign are specially tailoring the Monero crypto-jacking malware to use a limited amount of CPU power in order to evade infections being detected.
Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.

Masha and these Bears

Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a prolific, well resourced, and persistent adversary.

They are sometimes portrayed as wild and reckless, but as seen under our visibility, the group can be pragmatic, measured, and agile.