Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses…
Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses…
German Interior Minister Horst Seehofer has sought to head off far-right claims of voter fraud ahead of Germany’s general election in September while highlighting threats of cyberattacks from both inside and outside Germany. At…
If you’re not already paying attention to the Kaseya ransomware incident, you should be. Matt Tait writes in Lawfare that it is likely the most important cybersecurity event of the year. Bigger than the Exchange hacks…
Russia’s hybrid warfare approach calls for attacking the populations of Russia’s adversaries not through WWII-like carpet bombing, but rather with a combination of disinformation campaigns, cyberattacks on critical infrastructure, supporting proxy forces, and…
There are currently more than three million unfilled cybersecurity jobs globally, and, as high-profile incidents like the Solar Winds attack demonstrate, it is vital to address that shortage. But it is difficult…
A typical buffer overflow occurs when a computer program receives a request to process more data than its physical memory is capable of handling all at once and places the excess into…
Hackers associated with the REvil gang, a major Russian ransomware syndicate have demanded $70 million in Bitcoin in exchange for a decryption tool to free the data of companies targeted, but also…
It’s been nine years since the LinkedIn data breach, eight years since Adobe customers were victims of cyber attackers and four years since Equifax made headlines for the exposure of private information…
In today’s digitalized world, researchers have access to more data than ever before. Generic central processing units (CPUs) and graphics processing units (GPUs) can handle and analyze this data, but they can…