Security News
The Fonix Ransomware operators have shut down their operation and released the master decryption allowing victims to recover their files for free. The ransomware operation was not as widely active as others, such as REvil, Netwalker, or STOP, but starting in November 2020, it picked up a bit, as shown by the ID Ransomware submissions below.
Europol and the European Commission have launched a new decryption platform that will help boost Europol's ability to gain access to information stored in encrypted media collected during criminal investigations. The new decryption platform operated by Europol's European Cybercrime Centre was developed in collaboration with the European Commission's Joint Research Centre science and knowledge service.
There is a new report on police decryption capabilities: specifically, mobile device forensic tools. This report documents the widespread adoption of MDFTs by law enforcement in the United States.
Tyler Technologies has paid a ransom for a decryption key to recover files encrypted in a recent ransomware attack. On September 23rd, Tyler Technologies suffered a cyberattack by the RansomExx ransomware operators, who were also behind recent attacks on Konica Minolta and IPG Photonics.
Researchers from universities in Germany and Israel have disclosed the details of a new timing attack that could allow malicious actors to decrypt TLS-protected communications. Raccoon can allow a man-in-the-middle attacker to crack encrypted communications that could contain sensitive information.
The developers behind the Shade ransomware on Monday announced that they ceased operations and publicly released decryption keys to let their victims recover files for free. Now, the ransomware's authors say they actually stopped distributing the malware at the end of last year, and that they now decided to completely close shop and release over 750,000 decryption keys, along with their decryption utility.
Nubeva Technologies, a cloud visibility SaaS software developer for enterprises with assets in public and private clouds and data centers, announced support for modern endpoint-based decryption. Nubeva TLS Decrypt, a software solution using symmetric key intercept technology, now allows organizations to offload decryption from proxy-based systems to allow full visibility with improved speed, performance and reduced cost.
Apple has responded to a demand from the United States' Attorney General William Barr that it grant the FBI access to two iPhones used in a recent shooting by carefully calling bullshit on his claims. Barr held a press conference on Monday in which he accused Apple of not having given the FBI "Any substantive assistance" in the case of Saudi airman Mohammed al-Shamrani, who shot and killed three American sailors at a naval base in Pensacola, Florida.
DNS-over-HTTPS (DoH) traffic can apparently be identified without actually decrypting it, a security researcher has discovered. The DoH protocol is aimed at improving the overall security of the...
Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their encrypted files for free without...