Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast. “What makes Rorschach...
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape...
In what’s a case of hacking the hackers, the darknet infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as...
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that’s deliberately designed to corrupt data and “inflict...
New research has disclosed what’s being called a security vulnerability in Microsoft 365 that could be exploited to infer message contents due...
An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to...
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting...
The Quickfox VPN is mainly used by Chinese citizens living abroad who need to access Chinese websites as most of these sites...
Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one...
Generally, agencies crack messages or seize an already available encrypted communication platform to keep track of cybercriminals. Two such examples would be...
In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service...
Around two years back, North Carolina State University researchers discovered [PDF] that over 100,000 GitHub repositories had leaked cryptographic (TLS and SSH)...
Forget about your products and services. Ignore all of your marketing efforts. The most essential aspect of a successful online business is...
When you think of WhatsApp, other than privacy concerns, the first thing that comes to your mind is chats or free video...
Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability...
French scientists have set a world record by cracking the most complex cryptography algorithm to date. The encryption key, in this case,...
So, you have some reason to remain anonymous on the net. You open Google, type in something like: “Basics of Internet anonymity”...
Earlier this year, the Israeli owner of the van demonstrated how hacking tools in his surveillance van were capable of hacking any...
The US, UK, and Australia are putting pressure on Facebook to create a backdoor in its encrypted messaging apps that would allow...
The main protection measure for files stored on a computer with Windows 10 operating system is the users’ password; however, data protection...