Security News

Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
2022-08-12 18:20

Zeppelin ransomware is back and employing new compromise and encryption tactics in its recent campaigns against various vertical industries-particularly healthcare-as well as critical infrastructure organizations, the feds are warning. Zeppelin also appears to have a new multi-encryption tactics, executing the malware more than once within a victim's network and creating different IDs and file extensions for multiple instances attack, according to the CISA. "This results in the victim needing several unique decryption keys," according to the advisory.

Asymmetric vs symmetric encryption: What’s the difference?
2022-08-09 15:08

Pros and cons of asymmetric encryption Pros of asymmetric encryption Asymmetric encryption allows the recipient to verify and authenticate the origin of a message, making it easy to avoid encrypted messages from an unknown sender. Cons of asymmetric encryption Asymmetric encryption is slower than symmetric encryption.

Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour
2022-08-07 04:15

A late-stage candidate encryption algorithm that was meant to withstand decryption by powerful quantum computers in the future has been trivially cracked by using a computer running Intel Xeon CPU in an hour's time. The algorithm in question is SIKE - short for Supersingular Isogeny Key Encapsulation - which made it to the fourth round of the Post-Quantum Cryptography standardization process by the U.S. Department of Commerce's National Institute of Standards and Technology.

British intelligence recycles old argument for thwarting strong encryption: Think of the children!
2022-07-22 07:30

Two notorious characters from the British security services have published a paper that once again suggests breaking end-to-end encryption would be a good thing for society. Nearly four years ago Ian Levy, technical director of the UK National Cyber Security Centre, along with technical director for cryptanalysis at the British spy agency GCHQ Crispin Robinson, published a paper arguing for "Virtual crocodile clips" on encrypted communications that could be used to keep us all safe from harm.

NIST unveils four quantum-resistant encryption tools to protect sensitive electronic information
2022-07-15 08:00

The U.S. Department of Commerce's National Institute of Standards and Technology has chosen the first group of quantum-resistant encryption tools, designed to withstand the assault of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on every day - such as online banking and email software. This Help Net Security video covers the highlights of four encryption algorithms selected by NIST..

Q-Day: The problem with legacy public key encryption
2022-07-15 04:30

Why legacy public key cryptography is exposing data to risk. In public key encryption, two parties that wish to share a secret need to exchange pairs of keys.

Rise in ransomware drives IT leaders to implement data encryption
2022-07-13 08:00

The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all corporate information as standard in the last year. In total, 47% now require the encryption of all data, whether it's at rest or in transit, according to Apricorn.

Week in review: Quantum-resistant encryption, attackers using deepfakes, Patch Tuesday forecast
2022-07-10 08:30

Threat actors exchange beacons for badgers to evade endpoint securityUnidentified cyber threat actors have started using Brute Ratel C4, an adversary simulation tool similar to Cobalt Strike, to try to avoid detection by endpoint security solutions and gain a foothold on target networks, Palo Alto Networks researchers have found. Attackers are using deepfakes to snag remote IT jobsMalicious individuals are using stolen personally identifiable information and voice and video deepfakes to try to land remote IT, programming, database and software-related jobs, the FBI has warned last week.

Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method
2022-07-06 22:12

The operators of the Hive ransomware-as-a-service scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method. "With its latest variant carrying several major upgrades, Hive also proves it's one of the fastest evolving ransomware families, exemplifying the continuously changing ransomware ecosystem," Microsoft Threat Intelligence Center said in a report on Tuesday.

NIST selects four encryption algorithms to thwart future quantum computer attacks
2022-07-06 19:13

The Department of Commerce's National Institute of Standards and Technology has chosen four encryption algorithms that are designed to withstand the hacking of a future quantum computer and protect digital information. NIST said all four of the algorithms were created by experts collaborating from multiple countries and institutions.