Remove Encryption Remove Financial Services Remove Metadata Remove Mining
article thumbnail

Vulnerability Recap 4/22/24 – Cisco, Ivanti, Oracle & More

eSecurity Planet

Widely-used PuTTY Utility Allows Recovery of Encryption Secret Keys Type of vulnerability: Deterministic cryptographic number generation. that didn’t generate sufficiently random numbers for encryption keys, which could allow an attacker to fully recover keys and impersonate users after obtaining roughly 60 signatures.