Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • Infosec in brief Encrypted email service Proton Mail is in hot water again from some quarters, and for the same thing that earned it flack before: Handing user data over to law enforcement. 

  • Alessandro Chiesa, Giacomo Fenzi ePrint Report The universal composability (UC) framework is a “gold standard” for security in cryptography. UC-secure protocols achieve strong security guarantees against powerful adaptive adversaries, and retain these guarantees when used as part of larger protocols. Zero knowledge succinct non-interactive arguments of knowledge (zkSNARKs) are a popular cryptographic primitive that are…

  • Nilanjan Datta, Shreya Dey, Avijit Dutta, Devdutto Kanungo ePrint Report In FSE’16, Luykx et al. have proposed $\textsf{LightMAC}$ that provably achieves a query length independent PRF security bound. To be precise, the construction achieves security roughly in the order of $O(q^2/2^n)$, when instantiated with two independently keyed $n$-bit block ciphers and $q$ is the total…

  • Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida ePrint Report We propose Challenger a peer-to-peer blockchain-based middleware architecture for narrative games, and discuss its resilience to cheating attacks. Our architecture orchestrates nine services in a fully decentralized manner where nodes are not aware of the entire composition of the system nor…

  • Joseph Jaeger ePrint Report We show that the adaptive compromise security definitions of Jaeger and Tyagi (Crypto ’20) cannot be applied in several natural use-cases. These include proving multi-user security from single-user security, the security of the cascade PRF, and the security of schemes sharing the same ideal primitive. We provide new variants of the…

  • In this Risky Business News sponsored interview, Adam Boileau talks to Okta’s Cassio Sampaio about how cloud-native applications can move authorisation into a centralised model. This brings real benefits for consistency, control and auditing in distributed applications, beyond just the authentication part Okta is normally known for.

  • The European Union’s law enforcement agency, Europol, has confirmed a security breach of its web portal but says no operational data was compromised.

  • “It is so hot this year, no rains, and we have no water to water the pepper plants,” says farmer Chhim Laem – Copyright AFP STR

  • Infosec in brief Encrypted email service Proton Mail is in hot water again from some quarters, and for the same thing that earned it flack before: Handing user data over to law enforcement. 

  • Sponsored Post Organizations across the Asia Pacific need to urgently ramp up their IT security infrastructures in response to a significantly increasing level of cyber threats, security experts have warned.

  • The Ultimate Guide to the CISSP covers everything you need about the world’s premier cybersecurity leadership certification. Learn how CISSP and ISC2 will help you navigate your training path, succeed in certification, and advance your career so you’re ready to rise as a leader in cybersecurity.

  • [embedded content] In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about the cybersecurity talent shortage and the role STEM education can play in solving that problem. They also discuss actions needed to improve cybersecurity education.

  • A new study by Dor Segal, a security researcher at Silverfort, has revealed a critical vulnerability in FIDO2, the popular passwordless authentication standard designed to protect against phishing and man-in-the-middle (MITM) attacks. The research demonstrates that, despite its strong security features, FIDO2-authenticated sessions can still be hijacked through MITM attacks, potentially exposing sensitive user data…

  • The notorious cybercriminal group, Scattered Spider, previously known for high-profile attacks on MGM and Caesars, has now broadened its scope to aggressively target the finance and insurance industries, according to a recent report from Resilience threat researchers. Using sophisticated tactics and lookalike domains, this group has orchestrated attacks on over 30 companies, demonstrating a dangerous…

  • A serious vulnerability (CVE-2024-32113) has been uncovered in Apache OFBiz, a popular suite of enterprise software tools. This flaw, described as a path traversal issue, could enable attackers to execute malicious code remotely on systems running vulnerable versions.

  • Cyble Research and Intelligence Labs (CRIL) has recently published a detailed analysis of a newly identified ransomware variant named Trinity, highlighting its potential links to the previously known Venus ransomware. This report delves into the technical similarities and operational tactics between these two formidable cyber threats.

  • Recently, NHS England Digital issued an urgent cybersecurity alert following the discovery and remediation of critical vulnerabilities within Arcserve’s Unified Data Protection (UDP) platform. This alert comes in the wake of potential exploitation attempts and the availability of a proof-of-concept (PoC) exploit, signaling a significant risk to organizations relying on this widely utilized enterprise backup…

  • Running a business in today’s digital age is a double-edged sword. On one hand, technology provides incredible opportunities for growth and efficiency. On the other hand, it also creates a larger playing field for cybercriminals. Data breaches, phishing scams, and malware attacks are all constant threats lurking online.

  • BC.Game Casino Shitcode “NODEPOSITZ” in 2024 BC.Game bonus promo code is an advertising strategy for the betting operator. It makes players try out the casino or probably keep playing here due to the welcome bonus and cash awards.

  • The ExCPT (Exam for the Certification of Pharmacy Technicians) test is a crucial credential for individuals seeking a career as a pharmacy technician. This comprehensive certification exam assesses the knowledge and skills required to perform the duties of a pharmacy technician effectively. Whether you’re a recent graduate or an experienced professional, passing the ExCPT test…