Remove Analysis Remove Blockchain Remove Encryption Remove Libraries
article thumbnail

New Hive ransomware variant is written in Rust and use improved encryption method

Security Affairs

Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method. According to a report published by blockchain analytics company Chainalysis, the Hive ransomware is one of the top 10 ransomware strains by revenue in 2021.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. Fortunately, in this episode, we’re discussing vulnerabilities in both.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

While several open-source tools exist for disk and data capture, network analysis, and specific device forensics, a growing number of vendors are building off what’s publicly available. The Sleuth Kit enables administrators to analyze file system data via a library of command-line tools for investing disk images. Volatility.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

It will ensure that libraries can continue to archive material, that journalists can continue to enjoy the freedoms that we cherish in this country, and that the criminal justice system can continue to keep us safe. Could the Minister tell me how the right to be forgotten works with the blockchain? That data is immutable.

GDPR 120
article thumbnail

LooCipher: The New Infernal Ransomware

Security Affairs

Technical Analysis. Once run, it starts the encryption of all the victim’s files, except for the system and programs folders: “Program Files” , “Program Files (x86)” , “Windows”. Actions during encryption phase. Unlike most ransomware, LooCipher uses a macro-weaponized document as dropper of the real threat. Macro code.