Tag: encryption
-
Yet Another Way to Bypass Google Chrome’s Encryption Protection
Authors of the VoidStealer Trojan uncovered a way to get around Google’s App-Bound Encryption (ABE), opening the door to infostealers. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/yet-another-way-bypass-google-chromes-encryption-protection
-
Starfighter 16: Linux-Laptop mit Opal-Verschlüsselung und abnehmbarer Webcam
Seit vielen Jahren arbeitet Starlabs am auf Datenschutz und Privatsphäre ausgelegten Starfighter 16. Jetzt kann der Laptop bestellt werden. First seen on golem.de Jump to article: www.golem.de/news/starfighter-16-linux-laptop-mit-opal-verschluesselung-und-abnehmbarer-webcam-2605-208392.html
-
Why ransomware attacks succeed even when backups exist
Backups don’t fail because they’re missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no path to recovery. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/why-ransomware-attacks-succeed-even-when-backups-exist/
-
Proton Mail brings quantum-safe email encryption to all accounts
Post-quantum protection is now available as an optional feature in Proton Mail across all plans, including the free tier. How post-quantum protection works Once enabled, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/06/proton-mail-post-quantum-protection-feature/
-
Remus Infostealer Adopts Lumma-Style Browser Key Theft to Bypass App-Bound Encryption
Remus is a newly observed 64-bit infostealer that closely tracks the Lumma Stealer codebase while adding EtherHiding-based C2 resolution and a refined Application”‘Bound Encryption (ABE) bypass for Chromium browsers. The first Remus activity dates back to early 2026, shortly after Lumma’s core operators were doxxed between August and October 2025, suggesting either a rebrand or…
-
LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations
Cambridge, MA, May 5th, 2026, CyberNewswire New right-sized offering brings advanced encryption, easy API integration, and HITRUST-certified compliance to the most underserved segment in healthcare email, with pricing starting at $99/month LuxSci, a leading provider of HIPAA compliant secure healthcare communications, today announced the launch of LuxSci Secure High Volume Email for mid-sized healthcare […]…
-
Proton Mail rolls out post-quantum encryption for all users as industry braces for ‘harvest now, decrypt later’ threat
Proton Mail has today announced the rollout of post-quantum encryption (PQC) across its email platform, making quantum-resistant key generation available to all users, including those on free plans, in what the company describes as a proactive step ahead of the quantum computing era. The feature, which users can opt into via Proton Mail’s encryption key…
-
Neue Pflicht zur Ende-zu-Ende-Verschlüsselung im Gesundheitswesen in Österreich
Tags: encryptionMit dem endgültigen Aus des Faxgeräts und strengeren regulatorischen Vorgaben steht das Gesundheitswesen vor einem weiteren entscheidenden Schritt in Richtung sicherer digitaler Kommunikation. Ab dem 30. Juni 2026 reicht in Österreich eine reine Transportverschlüsselung wie TLS nicht mehr aus. Gesundheitsdiensteanbieter sind dann verpflichtet, auf echte Ende-zu-Ende-Verschlüsselung, etwa mittels S/MIME, umzusteigen. Der Grund: Während TLS lediglich…
-
Cybersouveränität ist das neue Geschäftsmodell für digitale Vertrauenswürdigkeit
Cybersouveränität wird zur Vorstandsagenda: Nicht Regulierung, sondern die veränderte Natur von Daten (Cloud, Echtzeit-Replikation, KI) macht Souveränität zum zentralen Hebel für digitale Vertrauenswürdigkeit. »Kontrolle« ist oft nur eine Illusion: Region-Settings, Verschlüsselung und Backups reichen nicht, wenn Policy-Steuerung, Key-Ownership und Recovery-Prozesse nicht transparent und unter Realbedingungen getestet sind. Resilienz = nachweisbare Wiederherstellbarkeit: Prävention bleibt Pflicht ……
-
Agent’s claims on WhatsApp access spark security concerns
A US agent claimed WhatsApp encryption is fake and Meta can access messages; the probe was abruptly shut, raising security concerns. A US agent claimed WhatsApp encryption is fake, alleging Meta accesses all unencrypted messages, but Commerce Department abruptly shut the probe, leaving leaders questioning if consumer apps are safe for sensitive business decisions. In…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
AWS leans on prior ingenuity to face future AI and quantum threats
Tags: access, ai, attack, authentication, breach, cloud, communications, computer, computing, control, credentials, crypto, cryptography, cybersecurity, data, defense, encryption, exploit, google, Hardware, identity, infrastructure, Internet, lessons-learned, malicious, penetration-testing, phishing, risk, service, technology, threat, tool, updateSymmetric cryptography and the quantum threat: Back in the early 2010s, most hardware security modules used asymmetric cryptography to protect security keys. Asymmetric cryptography, the kind used to secure online communications, involves pairs of keys, one to lock, another to unlock. It’s a very useful and convenient approach when dealing with multiple parties.Amazon chose to…
-
AWS leans on prior ingenuity to face future AI and quantum threats
Tags: access, ai, attack, authentication, breach, cloud, communications, computer, computing, control, credentials, crypto, cryptography, cybersecurity, data, defense, encryption, exploit, google, Hardware, identity, infrastructure, Internet, lessons-learned, malicious, penetration-testing, phishing, risk, service, technology, threat, tool, updateSymmetric cryptography and the quantum threat: Back in the early 2010s, most hardware security modules used asymmetric cryptography to protect security keys. Asymmetric cryptography, the kind used to secure online communications, involves pairs of keys, one to lock, another to unlock. It’s a very useful and convenient approach when dealing with multiple parties.Amazon chose to…
-
WhatsApp’s encryption protects servers but leaves users exposed to client-side attacks
The use of encryption helps to secure WhatsApp’s infrastructure, but researchers at Black Hat Asia warn platform’s architecture is driving hackers to target user devices directly First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642369/WhatsApps-encryption-protects-servers-but-leaves-users-exposed-to-client-side-attacks
-
WhatsApp’s encryption protects servers but leaves users exposed to client-side attacks
The use of encryption helps to secure WhatsApp’s infrastructure, but researchers at Black Hat Asia warn platform’s architecture is driving hackers to target user devices directly First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642369/WhatsApps-encryption-protects-servers-but-leaves-users-exposed-to-client-side-attacks
-
Product showcase: SimpleX Chat removes user identifiers from messaging
SimpleX Chat is a free, private, open-source messenger that uses encryption and does not require user identifiers. It is available on mobile and desktop platforms, including … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/29/product-showcase-simplex-chat-secure-messaging/
-
Post-Quantum Cryptographic Agility in Model Context Protocol Transport
Learn how to secure Model Context Protocol transport with post-quantum cryptographic agility. Explore hybrid encryption, ML-KEM integration, and AI infrastructure protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/post-quantum-cryptographic-agility-in-model-context-protocol-transport/
-
Post-Quantum Cryptographic Agility in Model Context Protocol Transport
Learn how to secure Model Context Protocol transport with post-quantum cryptographic agility. Explore hybrid encryption, ML-KEM integration, and AI infrastructure protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/post-quantum-cryptographic-agility-in-model-context-protocol-transport/
-
Broken VECT 2.0 ransomware acts as a data wiper for large files
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/broken-vect-20-ransomware-acts-as-a-data-wiper-for-large-files/
-
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors.The fact that VECT’s locker permanently destroys large files rather than encrypting…
-
Linux storage management tool Stratis 3.9.0 adds online encryption and cache-less pool startup
Stratis is a tool for configuring pools and filesystems with enhanced storage functionality within the existing Linux storage management stack. It focuses on a command-line … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/28/stratis-3-9-0-linux-storage-management-tool-stratis-3-9-0-adds-encryption-cache-features/
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
Linux distributions have spent the past few years absorbing GPU vendor toolchains, Rust-based system components, and more stringent encryption defaults. Ubuntu 26.04 LTS, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/24/ubuntu-26-04-lts-resolute-raccoon-released/
-
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
Linux distributions have spent the past few years absorbing GPU vendor toolchains, Rust-based system components, and more stringent encryption defaults. Ubuntu 26.04 LTS, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/24/ubuntu-26-04-lts-resolute-raccoon-released/
-
Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
Linux distributions have spent the past few years absorbing GPU vendor toolchains, Rust-based system components, and more stringent encryption defaults. Ubuntu 26.04 LTS, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/24/ubuntu-26-04-lts-resolute-raccoon-released/
-
Quantum-Ready Security Is Coming to HPE Nonstop
<div cla HPE Nonstop customers are closer than they think to a post-quantum world. Cryptographically Relevant Quantum Computers (CRQCs) those capable of effectively cracking the asymmetric encryption that secures much of the digital world could be less than three years away, if Google is right. That represents a challenge, but also an opportunity. Introduced at…

