Browsing tag

cryptography

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the discovery credited to researchers Fabian Bäumer […]

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data from the CPU cache. […]

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts. The method is designed to “delay detonation of the sample until human mouse activity is detected,” Outpost24 security researcher Alberto Marín said in […]

Royal Ransomware Threat Takes Aim at U.S. Healthcare System

The U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting healthcare entities in the country. “While most of the known ransomware operators have performed Ransomware-as-a-Service, Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal,” the agency’s Health Sector Cybersecurity Coordination […]

Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware

A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities due to its “weak architecture and programming.” Cryptonite, unlike other ransomware strains, is not available for sale on the cybercriminal underground, and was instead offered for free by an actor named CYBERDEVILZ until recently through a […]

Microsoft Warns of “Cryware” Info-Stealing Malware Targeting Crypto Wallets

Microsoft is warning of an emerging threat targeting internet-connected cryptocurrency wallets, signaling a departure in the use of digital coins in cyberattacks. The tech giant dubbed the new threat “cryware,” with the attacks resulting in the irreversible theft of virtual currencies by means of fraudulent transfers to an adversary-controlled wallet. “Cryware are information stealers that […]

Scientists Crack Largest Encryption Key After 35 Million Hrs Of Computing

French scientists have set a world record by cracking the most complex cryptography algorithm to date. The encryption key, in this case, was 240 characters long making it 8 characters longer than the previous record. RSA-240, the encryption key cracked to achieve this feat is 795 bits in size and has 240 decimal digits. To […]

CryptonDie – A Ransomware Developed For Study Purposes

  CryptonDie is a ransomware developed for study purposes. Options –key key used to encrypt and decrypt files, default is random string(recommended) –dir Home directory for the attack, default is / –encrypt Encrypt all files –decrypt Decrypt all files –verbose Active verbose mode, default is False Example: python3 cryptondie.py –web-service http://127.0.0.1:5000 –dir /var/www/ –encrypt –verbose […]

This Technique Claims To Make Passwords 14 Million% Tougher To Crack

Tide, an Australia-based non-profit organization has come up with a technique called ‘Splintering’ that claims to make usernames and passwords 14 million percent tougher to crack than the contemporary techniques. The technique involves breaking up encrypted usernames and passwords into tiny pieces and then storing them separately in a decentralized distributed network. The same technique […]

Researchers Are Using $10 Raspberry Pi Zero For ‘Cheap Encryption’ In Space

There are several techniques of encryption that are deployed to secure communication protocols and devices but these techniques aren’t effective if you want to secure a satellite or spacecraft in space. Encryption in space is a tad different than how it is deployed on Earth. One of the reasons why encryption in space is challenging […]

What is Encryption?

Encryption is the process of converting clear information into the code to prevent unauthorized access to it. Governments, companies, and individuals use encryption methods to protect their personal data and prevent fraud. Recent studies show that about 50% of data and communications on the Internet are already encrypted over HTTPS. How does data encryption work? […]

What is Cryptocurrency?

Digital currency, which is protected by cryptography and is usually used as a medium of exchange in a digital peer-to-peer (P2P) economic system is called cryptocurrency. The use of cryptographic methods is what provides complete protection for these systems against fraud and counterfeiting. The first cryptocurrency that was ever created was Bitcoin, presented by the […]

The Advantages of a More Secure and Safer Blockchain

Blockchain technology has many uses and advantages over other types of ledger-based technology. One aspect of blockchain technology that is especially valuable today is the ability to securely and safely transmit data to and from two or more parties. This is particularly important when the information being shared is highly confidential or valuable. Or, it […]

Certification authorities, a weak point for web cryptography

According to an investigation, five out of 17 certification authorities are vulnerable to IP fragmentation attacks During a recent cybersecurity event in Europe, the state of web cryptography was a recurrent topic. According to experts in digital forensics from the International Institute of Cyber Security, it is very difficult for hackers to break elliptical curve […]

imR0T – Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13)

imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution. How To Use It’s simple: # Clone this repository git clone https://github.com/Screetsec/imR0T.git # Go into the repository cd imR0T # […]

Crypto Movie Starring Alexis Bledel Coming Soon

Cryptocurrencies such as Bitcoin have been gaining more and more public attention over recent years. Now, the digital currency industry has hit Hollywood with the upcoming crime thriller “Crypto.” While this is not the first cryptocurrency movie ever made, it is the first movie that will be making a debut in the Hollywood scene and […]

Update your devices: New Bluetooth flaw lets attackers monitor traffic

The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not all the parameters involved are appropriately validated by the cryptographic algorithm. If the vulnerability is exploited it can allow a remote attacker within the range of […]

IBM Developing World’s Tiniest Computer Smaller than a Grain of Salt

At Think 2018, IBM has announced developing world’s tiniest computer that will cost less than ten cents to manufacture and can monitor, analyze, communicate, and even act on data.  Think 2018 is IBM’s flagship annual conference that commenced on March 19. At the event, the company introduced its newest, innovative ventures including the first prototype […]