encryption

Royal Ransomware uses a unique “partial encryption approach” to evade detection

CISA and FBI have published a joint cybersecurity alert on Royal ransomware used in recent cyberattacks as recently as January 2023. The ransomware uses a unique “partial encryption approach” to evade detection.

Royal Ransomware uses a unique “partial encryption approach” to evade detection Read More »

Microsoft report highlights Mac ransomware threats and techniques

Microsoft has released new details on Mac ransomware threats, techniques and provided guidance on how to protect networks and systems from ransomware attacks.

Microsoft report highlights Mac ransomware threats and techniques Read More »

NSA: New guidance to eliminate obsolete TLS protocols

The National Security Agency (NSA) has issued new guidance to eliminate obsolete Transport Layer Security (TLS) protocol configurations (such as TLS 1.0, TLS 1.1, SSLv2, SSLv3 and weak ciphers).

NSA: New guidance to eliminate obsolete TLS protocols Read More »

NSA: Guidance to mitigate cloud vulnerabilities

The National Security Agency (NSA) has released guidelines to help organizations mitigate cloud vulnerabilities. The NSA document includes four classes of vulnerabilities at most risk to threat actors.

NSA: Guidance to mitigate cloud vulnerabilities Read More »

WannaCry, Petya and Copycat Ransomware Expose Good History Lessons for Small Business and Enterprise Security

On May 12, 2017, the now infamous WannaCry ransomware burst onto the worldwide scene. WannaCry infected over 200,000 systems and 150 countries in just 3 days.

WannaCry, Petya and Copycat Ransomware Expose Good History Lessons for Small Business and Enterprise Security Read More »

Bluetooth BR/EDR supported devices vulnerable to cyber attacks

Security researchers have identified a security vulnerability related to encryption on Bluetooth BR/EDR connections. As a result, an unauthenticated attacker near the vulnerable device could exploit the issue and escalate privileges or steal information.

Bluetooth BR/EDR supported devices vulnerable to cyber attacks Read More »

NIST SP 800-177 Revision 1: “Trustworthy Email”

The National Institute of Standards and Technology (NIST) has releases its Security Publication (SP) 800-177 Revision 1, that include security guidelines and recommendations for achieving “trustworthy email”.

NIST SP 800-177 Revision 1: “Trustworthy Email” Read More »