Security News

Lockbit wins ransomware speed test, encrypts 25,000 files per minute
2022-03-23 12:01

The vendor's research team Surge today published research on how long it takes 10 of the big ransomware families including Lockbit, Conti, and REvil to encrypt 100,000 files. While the criminal gangs' speeds varied, Surge found the median ransomware variant can encrypt nearly 100,000 files totaling 53.93GB in 42 minutes and 52 seconds.

Alert: Let's Encrypt to revoke about 2 million HTTPS certificates in two days
2022-01-26 21:26

Let's Encrypt, a non-profit organization that helps people obtain free SSL/TLS certificates for websites, plans to revoke a non-trivial number of its certs on Friday because they were improperly issued. In a post to the Let's Encrypt discussion community forum, site reliability engineer Jillian Tessa explained that on Tuesday, a third party reported "Two irregularities" in the code implementing the "TLS Using ALPN" validation method in Boulder, its Automatic Certificate Management Environment software.

Let's Encrypt is revoking lots of SSL certificates in two days
2022-01-26 10:38

Let's Encrypt will begin revoking certain SSL/TLS certificates issued within the last 90 days starting January 28, 2022. As a non-profit certificate authority run by Internet Security Research Group, Let's Encrypt provides X.509 certificates for Transport Layer Security encryption at no cost.

Encrypt your emails from end to end for a lifetime with this software
2021-12-17 11:00

When only the utmost privacy will do for the messages you exchange by e-mail, you need a service that protects them entirely, but many additional privacy and security features are a big help. If you cherish your privacy and security and are looking for an alternative to something like ProtonMail, then the CTemplar End-to-End Encrypted Email Prime Plan: Lifetime Subscription should be exactly what you need.

Hive ransomware now encrypts Linux and FreeBSD systems
2021-10-29 16:08

The Hive ransomware gang now also encrypts Linux and FreeBSD using new malware variants specifically developed to target these platforms. The ransomware's Linux version also fails to trigger the encryption if executed without root privileges because it attempts to drop the ransom note on compromised devices' root file systems.

Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor
2021-10-07 09:35

Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor."This is one of the fastest ransomware attacks Sophos has ever investigated and it appeared to precision-target the ESXi platform," said Andrew Brandt, principal researcher at Sophos.

How to encrypt specific sections of Google Docs with the DocSecrets add-on
2021-10-06 15:25

Anyone that needs to hide away sections of text in Google Documents should give this handy add-on a try. When whole documents are sensitive, I tend to not write them in Google Docs, but rather a locally installed tool that makes it possible to encrypt a document.

Ransomware gang encrypts VMware ESXi servers with Python script
2021-10-05 13:00

Operators of an unknown ransomware gang are using a Python script to encrypt virtual machines hosted on VMware ESXi servers. While the Python programming language is not commonly used in ransomware development, it is a logical choice for ESXi systems, seeing that such Linux-based servers come with Python installed by default.

S3 Ep52: Let’s Encrypt, Outlook leak, and VMware exploit [Podcast]
2021-09-30 18:49

" Guess what? iOS 12 wasn't dead, it was just resting. Researchers rediscover an Outlook data leakage issue.

Serious Security: Let’s Encrypt gets ready to go it alone (in a good way!)
2021-09-28 18:47

HTTPS, short for secure HTTP, relies on the encryption protocol known as TLS, which is short for transport layer security. Many high-traffic sites were afraid of HTTPS because of the extra time taken by the "Cryptographic dance" demanded by the protocol every time a visitor arrived at the site, and because of the need to encrypt and decrypt every byte sent and received thereafter.