article thumbnail

Review: Can We Trust the Waterfox Browser? (Updated 2023)

Security Boulevard

Waterfox came into the browser scene in 2011, coming right out the box with official x64 support (a rarity among browsers at the time) and promoted itself as an "ethical browser." However, many things have changed in the browser landscape, and even the Waterfox project as whole since 2011. Additionally, the default search remains Bing.

article thumbnail

Antlion APT group used a custom backdoor that allowed them to fly under the radar for months

Security Affairs

The xPack backdoor is a.NET loader that fetches and executes AES-encrypted payloads, it supports multiple commands. Attackers also used legitimate versions of WinRAR appear for data exfiltration and batch scripts to automate the data collection process. ” concludes the report that includes IoCs and Yara Rules.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

Better data security so Facebook sees less. On the other hand, WhatsApp -- purchased by Facebook in 2014 -- provides users with end-to-end encrypted messaging. It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. Better use of Facebook data to prevent violence.

article thumbnail

Prilex: the pricey prickle credit card complex

SecureList

The first two samples had 2010/2011 as the compilation date, as shown on the graph below. In fact, the PIN is encrypted in the device upon entry using a variety of encryption schemes and symmetric keys. This is how SPSniffer gets credit card data. Sometimes the traffic is not even encrypted. START GHOST] _.

Malware 95
article thumbnail

FinSpy: unseen findings

SecureList

Kaspersky has been tracking deployments of this spyware since 2011. Both of them are encrypted with RC4. All communications between the server are encrypted with RC4. This module uses the same communication protocol that is used in the main Trojan component: The TLV ( type-length-value ) format to exchange data with C2 servers.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Bessemer Venture Partners. NightDragon. Sequoia Investments. Also read : Top Cyber Insurance Companies.