8.7 C
London
Wednesday, September 20, 2017
Home Tags Rivest-Shamir-Adleman (RSA)

Tag: Rivest-Shamir-Adleman (RSA)

RSA's VP and GM of Global Public Sector Practice Mike Brown believes there's a better way to thwart terrorism than breaking end-to-end encryption, as recently proposed by the Australian government.
New iteration of SIEM platform provides an enhanced user interface to help make it easier for security analysts to handle incident response and investigations.

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware wonrsquo;t write the special malicious code which encrypts the MFT to MBR.
Some have even speculated that some kind of conspiracy might be ongoing.… Read Full Article
GnuPG recently patched cryptographic library Libgcrypt, preventing a local side-channel attack; something that could have allowed full key recovery for RSA-1024.
While the world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.

Schroedinger’s Pet(ya)

Earlier today (June 27th), we received reports about a new wave of ransomware attacks spreading around the world, primarily targeting businesses in Ukraine, Russia and Western Europe. Our investigation is ongoing and our findings are far from final at this time.

Despite rampant public speculation, the following is what we can confirm from our independent analysis.
Put the management interface behind the firewall, pronto Stop us if you've heard this one: an emergency access feature offered by RSA for SecurID token customers isn't completely secure.…
GoDaddy, along with researchers from RSA Security and other companies, shut down tens of thousands of illegal established subdomains tied to the RIG Exploit Kit.
A company that couldn't strike a deal with Visa now seeks patent royalties.
In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.
Verarsquo;s job is to bolster usersrsquo; ability to ensure that only trusted individuals can access sensitive information in real time, regardless of its location.

XPan, I am your father

While we have previously written on the now infamous XPan ransomware family, some of it’s variants are still affecting users primarily located in Brazil.

This sample is what could be considered as the “father” of other XPan ransomware variants.

A considerable amount of indicators within the source code depict the early origins of this sample.