article thumbnail

NIST Releases First Post-Quantum Encryption Algorithms

Schneier on Security

EDITED TO ADD: Good article : One – ML-KEM [PDF] (based on CRYSTALS-Kyber) – is intended for general encryption, which protects data as it moves across public networks. NIST plans to select one or two of these algorithms by the end of 2024. My recent writings on post-quantum cryptographic standards. Sllashdot thread.

article thumbnail

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

Security Affairs

The Glove Stealer malware exploits a new technique to bypass Chrome’s App-Bound encryption and steal browser cookies. The malware bypasses Chrome’s App-Bound Encryption by utilizing the IElevator service, a method that was disclosed in October 2024. Gen Digital observed phishing campaigns distributing the Glove Stealer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2024-28989: Weak Encryption Key Management in Solar Winds Web Help Desk

NetSpi Technical

This led to an analysis of the software and how it stored encrypted passwords, giving the red team the ability to recover the stored passwords and use them to access other systems. TL;DR an attacker with access to a Web Help Desk backup file may be able to recover some of the encrypted passwords stored within it.

article thumbnail

IT threat evolution in Q3 2024. Non-mobile statistics

SecureList

IT threat evolution in Q3 2024 IT threat evolution in Q3 2024. Non-mobile statistics IT threat evolution in Q3 2024. Quarterly figures In Q3 2024: Kaspersky solutions successfully blocked more than 652 million cyberattacks originating from various online resources. Reveton was among the most notorious PC screen lockers.

Mobile 106
article thumbnail

APT trends report Q3 2024

SecureList

This is our latest roundup, covering activity we observed during Q3 2024. However, P8 contains many built-in functions and redesigns of the communication protocol and encryption algorithm, making it a well-designed and powerful espionage platform. A Trojanized version of the software module was found to be used in these attacks.

Malware 118
article thumbnail

IT threat evolution Q3 2024

SecureList

IT threat evolution in Q3 2024 IT threat evolution in Q3 2024. Non-mobile statistics IT threat evolution in Q3 2024. Mobile statistics Targeted attacks New APT threat actor targets Russian government entities In May 2024, we discovered a new APT targeting Russian government organizations.

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

We drilled down on a few significant developments expected to play out in 2024 and beyond. Each time we use a mobile app or website-hosted service, digital certificates and the Public Key Infrastructure ( PKI ) come into play — to assure authentication and encrypt sensitive data transfers. We met at DigiCert Trust Summit 2023.