资讯

The new group relies on data theft and encryption, but coding errors in its ransom note routine expose weaknesses that ...
August 2025 campaigns deliver kkRAT and Gh0st RAT variants via SEO poisoning, disabling antivirus to hijack crypto wallets.
ESET Research has discovered HybridPetya, a copycat of the infamous Petya/NotPetya malware that adds the capability of compromising UEFI-based systems and weaponizing CVE‑2024‑7344 to bypass UEFI ...
APT28 deploys NotDoor Outlook backdoor via OneDrive DLL side-loading, enabling email-based data theft in NATO firms.
All products featured here are independently selected by our editors and writers. If you buy something through links on our site, Mashable may earn an affiliate commission. Kindles used to only ...
Encrypted text messages may finally reach iPhone users with iOS 26. Code in the beta version of iOS 26 reveals strings for RCS encryption. With encryption, texts between iOS and Android will be more ...
The UK has agreed to drop its mandate that Apple install a backdoor into the encrypted data stored on its devices, though it isn’t clear whether this is an overall change or simply a tweak to protect ...
Abstract: In today's digital world, protecting sensitive data is essential, and encryption plays a vital role in safeguarding this information. This paper presents a study of three encryption ...
Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang's encryptors, allowing them to recover a victim's files for free without paying a ransom. This occurred in 2023 during ...
Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, ...