article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

What should I be most concerned about – and focus on – in 2024? Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. Consumers will begin to see their favorite applications touting “quantum-secure encryption.”

article thumbnail

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

The Last Watchdog

We drilled down on a few significant developments expected to play out in 2024 and beyond. Each time we use a mobile app or website-hosted service, digital certificates and the Public Key Infrastructure ( PKI ) come into play — to assure authentication and encrypt sensitive data transfers. We met at DigiCert Trust Summit 2023.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

Related: Cybersecurity takeaways of 2023 I recently visited with Mihoko Matsubara , Chief Cybersecurity Strategist at NTT to discuss why this worry has climbed steadily over the past few years – and is likely to intensify in 2024. The wider context is all too easy to overlook. For a full drill down, please view the accompanying videocast.

article thumbnail

State of ransomware in 2024

SecureList

It utilizes customizable attack vectors, including deceptive tactics like a fake Windows Update screen displayed to mask the file encryption process, and employs security measures for testing purposes, such as checking for “Vaccine.txt” before executing.

article thumbnail

Exploits and vulnerabilities in Q1 2024

SecureList

Additionally, we take a close look at several noteworthy vulnerabilities discovered in Q1 2024. The number of newly registered CVEs, 2019 — 2024. The decline in 2024 is due to data being available for Q1 only ( download ) As the chart illustrates, the number of new vulnerabilities has been steadily increasing year over year.

article thumbnail

Over 92,000 Internet-facing D-Link NAS devices can be easily hacked

Security Affairs

A researcher who goes online with the moniker ‘Netsecfish’ disclosed a new arbitrary command injection and hardcoded backdoor flaw, tracked as , tracked as CVE-2024-3273 , that impacts multiple end-of-life D-Link Network Attached Storage (NAS) device models. This trick allows attackers to obtain bypass authentication. .

Internet 131
article thumbnail

Dashlane 2024

eSecurity Planet

Internet security best practices mandate unique credentials for each online account; doing so would be impossible without a solid password manager like Dashlane. This software uses patented security architecture with 256-bit encryption, plus built-in two factor authentication. You can unsubscribe at any time.