article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. It also said the researchers were overselling their findings.

Security 115
article thumbnail

Analysis of NoCry ransomware: A variant of the Judge ransomware

Security Affairs

Researchers at Tesorion released a decryptor for Judge ransomware that also decrypts files encrypted by the NoCry ransomware. In January this year, we published a blog post on our analysis of the Judge ransomware. Fortunately, our decryptor for Judge also decrypts files encrypted by the NoCry/Stupid ransomware. A free decryptor.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. In recent years, we’ve seen a sharp rise in reporting and analysis of data breaches – arguably both a stimulant and a symptom of cyber-security taking its place on the board agenda. Enter encryption.

article thumbnail

Experts spotted a variant of the Agenda Ransomware written in Rust

Security Affairs

” reads the analysis published by Trend Micro. The Rust variant has also been seen using intermittent encryption, one of the emerging tactics that threat actors use today for faster encryption and detection evasion.” This tactic also allows for avoiding detections based on the analysis of read/write file operations.

article thumbnail

Ragnar Ransomware encrypts files from virtual machines to evade detection

Security Affairs

Ransomware encrypts from virtual machines to evade antivirus. Ragnar Locker deploys Windows XP virtual machines to encrypt victim’s files, the trick allows to evaded detection from security software. ” continues the analysis. Mounting all the shared drives to encrypt.

article thumbnail

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be executed in the encryption app CyberChef. We've brought technology from our past into the present by creating emulators for Enigma, Typex and The Bombe in #CyberChef. Pierluigi Paganini.

article thumbnail

Hertzbleed Side-Channel Attack allows to remotely steal encryption keys from AMD and Intel chips

Security Affairs

Hertzbleed attack: Researchers discovered a new vulnerability in modern Intel and AMD chips that could allow attackers to steal encryption keys. The experts will present their findings at the 31st USENIX Security Symposium that will take place in Boston, 10–12 August 2022. ” reads the website set up to describe the attack.