Tag: encryption
-
(g+) Verschlüsselung, Maskierung, Kontrolle: Datenschutz im laufenden Betrieb
Tags: encryptionMit welchen Methoden Daten auch bei Nutzung und Anzeige vor neugierigen Blicken geschützt bleiben – selbst auf Administratorenebene. First seen on golem.de Jump to article: www.golem.de/news/verschluesselung-maskierung-kontrolle-datenschutz-im-laufenden-betrieb-2508-199050.html
-
First AI-Powered Ransomware “PromptLock” Uses OpenAI gpt-oss-20b for Encryption
PromptLock, a novel ransomware strain discovered by the ESET Research team, marks the first known instance of malware harnessing a local large language model to generate its malicious payload on the victim’s machine. Rather than carrying pre-compiled attack logic, PromptLock ships with hard-coded prompts that instruct a locally hosted OpenAI gpt-oss:20b model”, accessed via the…
-
Microsoft Unveils Storm-0501’s Cloud-Based Ransomware Deployment Tactics
Tags: backup, cloud, cyber, data, encryption, endpoint, exploit, intelligence, malware, microsoft, ransom, ransomware, tactics, threatMicrosoft Threat Intelligence has detailed the evolving tactics of the financially motivated threat actor Storm-0501, which has transitioned from traditional on-premises ransomware deployments to sophisticated cloud-based operations. Unlike conventional ransomware that relies on endpoint encryption malware and subsequent decryption key negotiations, Storm-0501 exploits cloud-native capabilities to exfiltrate massive data volumes, obliterate backups, and enforce ransom…
-
Storm-0501 hackers shift to ransomware attacks in the cloud
Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to focusing on cloud-based encryption, data theft, and extortion. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/
-
Encryption Vendor Virtru Settles Patent Case With Microsoft
Deal Ends Suit Alleging Microsoft’s Message Encryption Tool Violated Virtru Patents. After three years of litigation, Virtru and Microsoft have settled a patent infringement case involving the tech giant’s email encryption product. The suit claimed Microsoft’s technology infringed Virtru’s patented identity-driven encryption method for seamless, credential-free data access. First seen on govinfosecurity.com Jump to article:…
-
Underground Ransomware Gang Unleashes Innovative Tactics Targeting Global Organizations
The Underground ransomware gang has been coordinating recurring attacks on enterprises throughout the globe in a worrying increase in cyber risks. They have demonstrated sophisticated malware engineering that blends cutting-edge encryption techniques with focused penetration measures. First detected in July 2023, the group resurfaced in May 2024 with a revamped Dedicated Leak Site (DLS), where…
-
TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Tags: access, ai, apple, attack, backup, banking, browser, business, ceo, chrome, ciso, compliance, computer, computing, control, country, credentials, cybersecurity, data, data-breach, ddos, dns, encryption, endpoint, google, government, group, international, Internet, jobs, law, microsoft, mobile, network, phishing, phone, privacy, programming, radius, risk, service, smishing, strategy, switch, technology, threat, update, vpn, windows, zero-trustSummary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet technologies, is explored. The discussion highlights the critical importance and challenges of migrating to IPv6 and the necessity of…
-
Encryption Backdoor in Military/Police Radios
I wrote about this in 2023. Here’s the story: Three Dutch security analysts discovered the vulnerabilities”, five in total”, in a European radio standard called TETRA (Terrestrial Trunked Radio), which is used in radios made by Motorola, Damm, Hytera, and others. The standard has been used in radios since the ’90s, but the flaws remained…
-
Jubiläum ESicherheitsspezialist Seppmail ist seit 10 Jahren in Deutschland
Die Seppmail Deutschland GmbH, ein führender Anbieter für sichere E-Mail-Kommunikation, feiert im August 2025 ihr 10-jähriges Bestehen. Seit 2015 bietet das Unternehmen zuverlässige Lösungen für E-Mail-Verschlüsselung und Datenschutz. Der Anlass würdigt ein Jahrzehnt erfolgreicher Zusammenarbeit mit Kunden, Partnern und Mitarbeitern ein Meilenstein, der nicht nur die kontinuierliche Entwicklung des Unternehmens unterstreicht, sondern auch […] First…
-
FTC Chair Tells Tech Giants to Hold the Line on Encryption
The chairman sent letters out to companies like Apple, Meta, and Microsoft, advising them not to adhere to the demands of foreign governments to weaken their encryption. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ftc-chair-tech-giants-encryption
-
FTC warns tech giants not to bow to foreign pressure on encryption
The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data security, compromise encryption, or impose censorship on their platforms. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/
-
FTC warns tech giants not to bow to foreign pressure on encryption
The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data security, compromise encryption, or impose censorship on their platforms. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ftc-warns-tech-giants-not-to-bow-to-foreign-pressure-on-encryption/
-
How AI is reshaping cybersecurity operations
Tags: access, ai, attack, business, ciso, cloud, control, cyber, cybersecurity, data, defense, detection, encryption, finance, gartner, governance, guide, hacker, infrastructure, intelligence, jobs, malware, microsoft, monitoring, phishing, regulation, resilience, risk, sans, service, skills, soc, strategy, supply-chain, technology, threat, tool, training, updateBecause AI can perform tasks at speeds that supersede human capacity, it exponentially scales the amount of work that a cybersecurity function can do, says Rob T. Lee, chief of research for AI and emerging threats and head of faculty at SANS Institute.Moreover, AI excels at doing repetitive tasks near perfectly every time, so it…
-
Ensuring security in a borderless world: The 30th anniversary of Schengen system
Tags: access, ai, cloud, compliance, computing, control, country, cyber, cybersecurity, data, dora, encryption, framework, GDPR, infrastructure, mfa, network, nis-2, office, privacy, regulation, resilience, technology, tool, update -
FTC warns tech companies not to weaken encryption, free speech practices for foreign governments
Chair Ferguson cited the E.U.’s Digital Service Act and the U.K.’s Online Safety Act as statutes that incentivize U.S. tech companies “to censor speech, including speech outside of Europe.” First seen on cyberscoop.com Jump to article: cyberscoop.com/ftc-ferguson-tech-companies-weakening-encryption-data-privacy-free-speech/
-
Enterprise passwords becoming even easier to steal and abuse
Tags: access, attack, authentication, breach, ceo, ciso, compliance, control, credentials, cyber, cybersecurity, data, detection, encryption, exploit, extortion, group, identity, leak, mfa, monitoring, passkey, password, phishing, ransomware, risk, strategy, threat, tool, zero-trustGrowing threat from stolen credentials: Attackers actively target user credentials because they offer the most direct route or foothold into a targeted organization’s network. Once inside, attackers can move laterally across systems, searching for other user accounts to compromise, or they attempt to escalate their privileges and gain administrative control.This hunt for credentials extends beyond…
-
Defending Enterprise Data Against Quantum Encryption Attacks
Tags: attack, computer, crypto, cryptography, cybersecurity, data, encryption, linkedin, risk, technology, threat, toolThe quantum cliff is coming. Q-Day is the point in time when quantum computers become powerful enough to break most data encryption. It is inevitable that legacy algorithms will be undermined and the race is on to proactively migrate to modern tools to protect sensitive data. In our latest episode of Cybersecurity Insights, I sat…
-
Um bei der Nutzung amerikanischer Cloud-Lösungen beim Datenschutz auf Nummer sicher zu gehen, setzen Unternehmen auf Security-Audits, Penetrationstests und Verschlüsselung
Über 86 Prozent der Unternehmen in Deutschland planen derzeit konkrete Maßnahmen, um ihre Daten zu schützen und compliant zu sein. Das hat eine von Techconsult im Auftrag von Eperi durchgeführte Umfrage herausgefunden. Diese hat sich mit der Frage beschäftigt, inwieweit heute seitens der Unternehmen Maßnahmen ergriffen werden, um bei der Nutzung von US-Cloud-Lösungen die Einhaltung…
-
UK Retreats on Apple Encryption Backdoor Demand Following US Pressure
US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-retreats-apple-encryption/
-
Automation Alert Sounds as Certificates Set to Expire Faster
Maximum Validity of Public TLS Certificates Will Drop From 398 Days to Just 47 Days. The future of managing digital certificates is already here – it’s just not evenly distributed yet. With the public TLS certificate validity period set to drop to just 47 days, as well as the need to migrate to quantum-safe encryption,…
-
UK ‘agrees to drop’ demand over Apple iCloud encryption, US intelligence head claims
The United Kingdom is backing down from a controversial legal demand targeting Apple, U.S. Director of National Intelligence Tulsi Gabbard claimed on social media. First seen on therecord.media Jump to article: therecord.media/uk-agrees-drop-apple-encryption
-
US says UK has agreed to drop encryption ‘back door’ demands against Apple
US and UK end diplomatic row over UK encryption ‘back door’ order against Apple, but it remains unclear whether Apple will restore advance encryption services to UK users First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366629434/US-says-UK-has-agreed-to-drop-encryption-back-door-demands-against-Apple
-
Cooking with Code: A DevOps Kitchen Secured by Thales
Tags: access, ai, api, cctv, cloud, compliance, control, data, encryption, GDPR, identity, infrastructure, injection, least-privilege, malicious, mfa, military, monitoring, PCI, service, software, strategy, tool, waf, zero-day, zero-trustCooking with Code: A DevOps Kitchen Secured by Thales madhav Tue, 08/19/2025 – 05:13 In today’s hyperconnected digital world, deploying applications is a lot like running a high-performance, Michelin-star kitchen. You need the right setup, a disciplined process, and seamless coordination, where every tool, role, and task moves in harmony, executed flawlessly. Speed and precision…
-
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback
The U.K. government has apparently abandoned its plans to force Apple to weaken encryption protections and include a backdoor that would have enabled access to the protected data of U.S. citizens.U.S. Director of National Intelligence (DNI) Tulsi Gabbard, in a statement posted on X, said the U.S. government had been working with its partners with…
-
US spy chief claims UK backed down over Apple backdoor demand
Tulsi Gabbard boasts Washington forced Blighty to drop iPhone encryption fight First seen on theregister.com Jump to article: www.theregister.com/2025/08/19/uk_apple_backdoor_uturn/
-
Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques and operational details. The malware, first documented in 2022, employs the ptrace system call to detect debugging environments by attempting to attach to its parent process. If this fails typically due to an existing tracer…
-
(g+) Verschlüsselung auf Datenbankebene: Wie Daten selbst bei physischem Zugriff geschützt werden
Wir zeigen, wie mittels Transparent Data Encryption vertrauliche Informationen wirksam vor Unbefugten geschützt werden – sogar bei Zugriff auf Back-ups oder Datenbanken. First seen on golem.de Jump to article: www.golem.de/news/verschluesselung-auf-datenbankebene-wie-daten-selbst-bei-physischem-zugriff-geschuetzt-werden-2508-198929.html

