article thumbnail

Encryption is on the Rise!

Cisco Security

standard in RFC 8446 in August 2018, plenty of tools and utilities were already supporting it (even as early as the year prior, some web browsers had implemented it as their default standard, only having to roll it back due to compatibility issues. Toward the end of 2018, EMA conducted a survey of customers regarding their TLS 1.3

article thumbnail

Iran-linked DEV-0270 group abuses BitLocker to encrypt victims’ devices

Security Affairs

Iran-linked APT group DEV-0270 (aka Nemesis Kitten) is abusing the BitLocker Windows feature to encrypt victims’ devices. Microsoft Security Threat Intelligence researchers reported that Iran-linked APT group DEV-0270 ( Nemesis Kitten ) has been abusing the BitLocker Windows feature to encrypt victims’ devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

At the time, in the spring of 2018, only 25 percent of commercial websites used HTTPS; today adoption is at 98 percent and rising. This surge in TLS abuse has shifted the security community’s focus back to a venerable network security tool, the firewall. How TLS works is that there is an encryption point and a decryption point.

Malware 214
article thumbnail

Hacked by Police

Schneier on Security

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents. Encrochat was trapped.

Hacking 337
article thumbnail

ESET PROTECT Advanced Review: Features & Benefits

eSecurity Planet

With a multi-layered approach to endpoint protection, the ESET PROTECT Advanced solution fits small to medium-sized businesses and offers advanced EPP capabilities, full disk encryption , and an automated sandbox for dynamic threat analysis. Full Disk Encryption. Read more: 19 Best Encryption Software & Tools of 2021.

article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

Another example of back to the basics was how Gartner Research Directors Gorka Sadowski and Pete Shoard took us through the State of the Threat Landscape, 2018 (see chart below). This $60 device opens 3G out-of-band access, behind the firewall, for the owner. Two gizmos they showed off were amazing. The first, was the LAN Turtle.

Risk 59
article thumbnail

Top Cloud Data Breaches in 2018 Lessons Learned

Spinone

As we look at the past year of 2018, it is all too easy to see that data breach or leak of sensitive information is not a problem that is going away anytime soon. Let’s take a look at the top Cloud Data Breaches in 2018 and see how they were carried out, what data was leaked, and the weakness that was exposed by the breach.